search for: iquery

Displaying 5 results from an estimated 5 matches for "iquery".

Did you mean: query
2010 Mar 10
1
func odbc and mult iquery
Hello, Does asterisk func odbc support multi query? I'm executing stored procedure which returns two tables. With tsql command I can see both tables. But asterisk only shows the first. My database is MSSQL. Maybe there is workaround... Thanks -- Best Regards, Giedrius -------------- next part -------------- An HTML attachment was scrubbed... URL:
1998 May 19
7
Bind Overrun Bug and Linux
...erable The inverse query feature is disabled by default, so only the systems that have been explicitly configured to allow it are vulnerable. BIND 8 Look at the "options" block in the configuration file (typically /etc/named.conf). If there is a "fake-iquery yes;" line, then the server is vulnerable. BIND 4.9 Look at the "options" lines in the configuration file (typically /etc/named.boot). If there is a line containing "fake-iquery", then the server is vulnerable. In addition, un...
1999 Mar 29
0
Re: ADM Worm. Worm for Linux x86 found in wild. (fwd)
...26 Mar 1999 21:17:40 +0100 From: Mixter <mixter@HOME.POPMAIL.COM> To: BUGTRAQ@NETSPACE.ORG Subject: Re: ADM Worm. Worm for Linux x86 found in wild. The "ADM w0rm" is public and can be found at: http://adm.isp.at/ADM/ADMw0rm-v1.tar The public version solely exploits the name server iquery bug, although it is fairly easy to make it exploit ANY remote vulnerability. (Put in BSD/Sun exploits and it wouldn't be too linux specific anymore. :&) Ben Cantrick (Macky Stingray) wrote: > How it picks the IP addresses to scan is not > presently known to me. Presumably, the &quot...
1998 Jun 06
21
Named update for RH 4.2 exploitable?
Someone I was speaking with this evening claimed they have installed the latest named rpms yet they are still getting exploited daily and being hacked. Do the latest rpm''s for the named 4.9.x stuff fix all the root exploits or is this person just an idiot who probably has holes elsewhere in the system?
1998 Aug 25
1
Named Overflow Concern - SUMMARY (fwd)
...ed/Imapd etc. > >Named is a very over-exploited vulnerability due to the fact that so many >servers are actualy vulnerable to it when running RedHat Linux boxes and >also due to the easyness of use, nothing complicated about its use.. > >localhost:~# named 127.0.0.1 >robo - dns IQUERY remote buffer overflow for intel linux >nimrood 5.16.98 >connecting...connected. >testing for vulnerability...vulnerable. >sending exploit code...1560 bytes sent. >bash# > >And there you have it, a remote shell. It scares me that an exploit like >this can give so much power...