Searched hist:2926 (Results 1 - 25 of 39) sorted by relevance
/freebsd-9.3-release/usr.sbin/ctm/ | ||
H A D | README | diff 2926 Tue Sep 20 05:13:39 MDT 1994 phk A bunch of improvements. Still far to go. |
/freebsd-9.3-release/usr.sbin/ctm/ctm/ | ||
H A D | ctm_ed.c | diff 2926 Tue Sep 20 05:13:39 MDT 1994 phk A bunch of improvements. Still far to go. |
H A D | ctm_input.c | diff 2926 Tue Sep 20 05:13:39 MDT 1994 phk A bunch of improvements. Still far to go. |
H A D | ctm_syntax.c | diff 2926 Tue Sep 20 05:13:39 MDT 1994 phk A bunch of improvements. Still far to go. |
H A D | Makefile | diff 2926 Tue Sep 20 05:13:39 MDT 1994 phk A bunch of improvements. Still far to go. |
H A D | ctm_pass1.c | diff 2926 Tue Sep 20 05:13:39 MDT 1994 phk A bunch of improvements. Still far to go. |
H A D | ctm.c | diff 2926 Tue Sep 20 05:13:39 MDT 1994 phk A bunch of improvements. Still far to go. |
H A D | ctm.h | diff 2926 Tue Sep 20 05:13:39 MDT 1994 phk A bunch of improvements. Still far to go. |
H A D | ctm_pass2.c | diff 2926 Tue Sep 20 05:13:39 MDT 1994 phk A bunch of improvements. Still far to go. |
H A D | ctm_pass3.c | diff 2926 Tue Sep 20 05:13:39 MDT 1994 phk A bunch of improvements. Still far to go. |
/freebsd-9.3-release/contrib/bind9/doc/arm/ | ||
H A D | Bv9ARM.ch01.html | diff 171577 Wed Jul 25 06:12:36 MDT 2007 dougb Vendor import of 9.4.1-P1, which has fixes for the following: 1. The default access control lists (acls) are not being correctly set. If not set anyone can make recursive queries and/or query the cache contents. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925 2. The DNS query id generation is vulnerable to cryptographic analysis which provides a 1 in 8 chance of guessing the next query id for 50% of the query ids. This can be used to perform cache poisoning by an attacker. This bug only affects outgoing queries, generated by BIND 9 to answer questions as a resolver, or when it is looking up data for internal uses, such as when sending NOTIFYs to slave name servers. All users are encouraged to upgrade. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926 Approved by: re (kensmith, implicit) |
H A D | Bv9ARM.ch02.html | diff 171577 Wed Jul 25 06:12:36 MDT 2007 dougb Vendor import of 9.4.1-P1, which has fixes for the following: 1. The default access control lists (acls) are not being correctly set. If not set anyone can make recursive queries and/or query the cache contents. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925 2. The DNS query id generation is vulnerable to cryptographic analysis which provides a 1 in 8 chance of guessing the next query id for 50% of the query ids. This can be used to perform cache poisoning by an attacker. This bug only affects outgoing queries, generated by BIND 9 to answer questions as a resolver, or when it is looking up data for internal uses, such as when sending NOTIFYs to slave name servers. All users are encouraged to upgrade. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926 Approved by: re (kensmith, implicit) |
H A D | Bv9ARM.ch10.html | diff 171577 Wed Jul 25 06:12:36 MDT 2007 dougb Vendor import of 9.4.1-P1, which has fixes for the following: 1. The default access control lists (acls) are not being correctly set. If not set anyone can make recursive queries and/or query the cache contents. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925 2. The DNS query id generation is vulnerable to cryptographic analysis which provides a 1 in 8 chance of guessing the next query id for 50% of the query ids. This can be used to perform cache poisoning by an attacker. This bug only affects outgoing queries, generated by BIND 9 to answer questions as a resolver, or when it is looking up data for internal uses, such as when sending NOTIFYs to slave name servers. All users are encouraged to upgrade. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926 Approved by: re (kensmith, implicit) |
H A D | Bv9ARM.ch03.html | diff 171577 Wed Jul 25 06:12:36 MDT 2007 dougb Vendor import of 9.4.1-P1, which has fixes for the following: 1. The default access control lists (acls) are not being correctly set. If not set anyone can make recursive queries and/or query the cache contents. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925 2. The DNS query id generation is vulnerable to cryptographic analysis which provides a 1 in 8 chance of guessing the next query id for 50% of the query ids. This can be used to perform cache poisoning by an attacker. This bug only affects outgoing queries, generated by BIND 9 to answer questions as a resolver, or when it is looking up data for internal uses, such as when sending NOTIFYs to slave name servers. All users are encouraged to upgrade. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926 Approved by: re (kensmith, implicit) |
H A D | Bv9ARM.ch04.html | diff 171577 Wed Jul 25 06:12:36 MDT 2007 dougb Vendor import of 9.4.1-P1, which has fixes for the following: 1. The default access control lists (acls) are not being correctly set. If not set anyone can make recursive queries and/or query the cache contents. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925 2. The DNS query id generation is vulnerable to cryptographic analysis which provides a 1 in 8 chance of guessing the next query id for 50% of the query ids. This can be used to perform cache poisoning by an attacker. This bug only affects outgoing queries, generated by BIND 9 to answer questions as a resolver, or when it is looking up data for internal uses, such as when sending NOTIFYs to slave name servers. All users are encouraged to upgrade. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926 Approved by: re (kensmith, implicit) |
H A D | Bv9ARM.ch05.html | diff 171577 Wed Jul 25 06:12:36 MDT 2007 dougb Vendor import of 9.4.1-P1, which has fixes for the following: 1. The default access control lists (acls) are not being correctly set. If not set anyone can make recursive queries and/or query the cache contents. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925 2. The DNS query id generation is vulnerable to cryptographic analysis which provides a 1 in 8 chance of guessing the next query id for 50% of the query ids. This can be used to perform cache poisoning by an attacker. This bug only affects outgoing queries, generated by BIND 9 to answer questions as a resolver, or when it is looking up data for internal uses, such as when sending NOTIFYs to slave name servers. All users are encouraged to upgrade. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926 Approved by: re (kensmith, implicit) |
H A D | Bv9ARM.ch07.html | diff 171577 Wed Jul 25 06:12:36 MDT 2007 dougb Vendor import of 9.4.1-P1, which has fixes for the following: 1. The default access control lists (acls) are not being correctly set. If not set anyone can make recursive queries and/or query the cache contents. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925 2. The DNS query id generation is vulnerable to cryptographic analysis which provides a 1 in 8 chance of guessing the next query id for 50% of the query ids. This can be used to perform cache poisoning by an attacker. This bug only affects outgoing queries, generated by BIND 9 to answer questions as a resolver, or when it is looking up data for internal uses, such as when sending NOTIFYs to slave name servers. All users are encouraged to upgrade. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926 Approved by: re (kensmith, implicit) |
H A D | Bv9ARM.ch08.html | diff 171577 Wed Jul 25 06:12:36 MDT 2007 dougb Vendor import of 9.4.1-P1, which has fixes for the following: 1. The default access control lists (acls) are not being correctly set. If not set anyone can make recursive queries and/or query the cache contents. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925 2. The DNS query id generation is vulnerable to cryptographic analysis which provides a 1 in 8 chance of guessing the next query id for 50% of the query ids. This can be used to perform cache poisoning by an attacker. This bug only affects outgoing queries, generated by BIND 9 to answer questions as a resolver, or when it is looking up data for internal uses, such as when sending NOTIFYs to slave name servers. All users are encouraged to upgrade. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926 Approved by: re (kensmith, implicit) |
H A D | Bv9ARM.ch09.html | diff 171577 Wed Jul 25 06:12:36 MDT 2007 dougb Vendor import of 9.4.1-P1, which has fixes for the following: 1. The default access control lists (acls) are not being correctly set. If not set anyone can make recursive queries and/or query the cache contents. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925 2. The DNS query id generation is vulnerable to cryptographic analysis which provides a 1 in 8 chance of guessing the next query id for 50% of the query ids. This can be used to perform cache poisoning by an attacker. This bug only affects outgoing queries, generated by BIND 9 to answer questions as a resolver, or when it is looking up data for internal uses, such as when sending NOTIFYs to slave name servers. All users are encouraged to upgrade. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926 Approved by: re (kensmith, implicit) |
H A D | Bv9ARM.html | diff 171577 Wed Jul 25 06:12:36 MDT 2007 dougb Vendor import of 9.4.1-P1, which has fixes for the following: 1. The default access control lists (acls) are not being correctly set. If not set anyone can make recursive queries and/or query the cache contents. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925 2. The DNS query id generation is vulnerable to cryptographic analysis which provides a 1 in 8 chance of guessing the next query id for 50% of the query ids. This can be used to perform cache poisoning by an attacker. This bug only affects outgoing queries, generated by BIND 9 to answer questions as a resolver, or when it is looking up data for internal uses, such as when sending NOTIFYs to slave name servers. All users are encouraged to upgrade. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926 Approved by: re (kensmith, implicit) |
H A D | man.dig.html | diff 171577 Wed Jul 25 06:12:36 MDT 2007 dougb Vendor import of 9.4.1-P1, which has fixes for the following: 1. The default access control lists (acls) are not being correctly set. If not set anyone can make recursive queries and/or query the cache contents. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925 2. The DNS query id generation is vulnerable to cryptographic analysis which provides a 1 in 8 chance of guessing the next query id for 50% of the query ids. This can be used to perform cache poisoning by an attacker. This bug only affects outgoing queries, generated by BIND 9 to answer questions as a resolver, or when it is looking up data for internal uses, such as when sending NOTIFYs to slave name servers. All users are encouraged to upgrade. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926 Approved by: re (kensmith, implicit) |
/freebsd-9.3-release/contrib/bind9/lib/dns/include/dns/ | ||
H A D | dispatch.h | diff 171577 Wed Jul 25 06:12:36 MDT 2007 dougb Vendor import of 9.4.1-P1, which has fixes for the following: 1. The default access control lists (acls) are not being correctly set. If not set anyone can make recursive queries and/or query the cache contents. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925 2. The DNS query id generation is vulnerable to cryptographic analysis which provides a 1 in 8 chance of guessing the next query id for 50% of the query ids. This can be used to perform cache poisoning by an attacker. This bug only affects outgoing queries, generated by BIND 9 to answer questions as a resolver, or when it is looking up data for internal uses, such as when sending NOTIFYs to slave name servers. All users are encouraged to upgrade. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926 Approved by: re (kensmith, implicit) |
/freebsd-9.3-release/usr.sbin/ctm/mkCTM/ | ||
H A D | mkCTM | diff 2926 Tue Sep 20 05:13:39 MDT 1994 phk A bunch of improvements. Still far to go. |
/freebsd-9.3-release/contrib/bind9/ | ||
H A D | README | diff 171577 Wed Jul 25 06:12:36 MDT 2007 dougb Vendor import of 9.4.1-P1, which has fixes for the following: 1. The default access control lists (acls) are not being correctly set. If not set anyone can make recursive queries and/or query the cache contents. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925 2. The DNS query id generation is vulnerable to cryptographic analysis which provides a 1 in 8 chance of guessing the next query id for 50% of the query ids. This can be used to perform cache poisoning by an attacker. This bug only affects outgoing queries, generated by BIND 9 to answer questions as a resolver, or when it is looking up data for internal uses, such as when sending NOTIFYs to slave name servers. All users are encouraged to upgrade. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926 Approved by: re (kensmith, implicit) |
/freebsd-9.3-release/contrib/bind9/bin/named/ | ||
H A D | client.c | diff 171577 Wed Jul 25 06:12:36 MDT 2007 dougb Vendor import of 9.4.1-P1, which has fixes for the following: 1. The default access control lists (acls) are not being correctly set. If not set anyone can make recursive queries and/or query the cache contents. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925 2. The DNS query id generation is vulnerable to cryptographic analysis which provides a 1 in 8 chance of guessing the next query id for 50% of the query ids. This can be used to perform cache poisoning by an attacker. This bug only affects outgoing queries, generated by BIND 9 to answer questions as a resolver, or when it is looking up data for internal uses, such as when sending NOTIFYs to slave name servers. All users are encouraged to upgrade. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926 Approved by: re (kensmith, implicit) |
Completed in 259 milliseconds