Applies To:

Show Versions Show Versions

Archived Release Note: 3-DNS Controller, PTF Note 3.0 PTF-01
Release Note

Updated Date: 07/24/2002

This article has been archived, and is no longer maintained.

Summary:

This product temporary fix (PTF) provides security enhancements for 3-DNS Controller, version 3.0. The PTF is recommended only for those customers who want the enhancements and fixes listed below. You can apply the software upgrade to version 3.0 only. For information about installing the PTF, please refer to the instructions below.

Contents:

- Installing the upgrade
- Software enhancements and fixes
     - What's fixed in this PTF
- Configuration changes
     - Required configuration changes

Installing the upgrade

The current PTF installs fixes from all PTFs released after version 3.0. (For details, see the following section, Software enhancements and fixes.) The following instructions explain how to install the 3-DNS Controller, version 3.0 PTF-01 onto existing systems running version 3.0.

The following instructions explain how to install 3-DNS Controller, version 3.0 PTF-01 onto existing systems running version 3.0.

Apply the PTF to 3-DNS Controller, version 3.0 using the following process:

  1. Change to the /var/tmp/ directory:
    cd /var/tmp/


  2. Connect to the F5 Networks FTP site at ftp.f5.com (contact your vendor to get a user ID and password for the F5 FTP site).


  3. Download the following upgrade file:
    3dns3.0PTF-01.tar


  4. Extract the kit file in the /var/tmp/ directory, by typing the following command:
    tar -xvf 3dns3.0PTF-01.tar


  5. Run the upgrade_ptf script in the /var/tmp/ directory to install the PTF, by typing the following command:
    ./upgrade_ptf

Once you install the software upgrade, refer to the Required configuration changes section for important information about configuration changes you must make on the 3-DNS Controller.

[ Top ]

Software enhancements and fixes

What's fixed in this PTF

CERT Advisory CA-2002-03, Multiple Vulnerabilities in Many Implementations of the Simple Network Management Protocol (SNMP)
The security vulnerabilities that are outlined in CERT Advisory CA-2002-03, Multiple Vulnerabilities in Many Implementations of the Simple Network Management Protocol (SNMP), have been fixed.

CERT Advisory CA-2002-17, Apache Web Server Chunk Handling Vulnerability
The security vulnerability that is outlined in CERT Advisory CA-2002-17, Apache Web Server Chunk Handling Vulnerability, has been fixed.

CERT Advisory CA-2002-18, OpenSSH Vulnerabilities in Challenge Response Handling
The OpenSSH software running on the 3-DNS Controller has been upgraded to version 3.4p1 to address the security vulnerability that is outlined in CERT Advisory CA-2002-18.

CERT Advisory CA-2002-19, Buffer Overflow in Multiple DNS Resolver Libraries
The buffer overflow vulnerability in DNS resolver libraries that is outlined in CERT Advisory CA-2002-19 has been fixed.

[ Top ]

Configuration changes

The following section provides information about both required and optional configuration changes.

Required configuration changes

The current release has no required configuration changes.

[ Top ]


Was this resource helpful in solving your issue?




NOTE: Please do not provide personal information.



Incorrect answer. Please try again: Please enter the words to the right: Please enter the numbers you hear:

Additional Comments (optional)