Applies To:
Show Versions3-DNS Controller versions 1.x - 4.x
- 3.0.0
Summary:
Contents:
Installing the upgrade
The current PTF installs fixes from all PTFs released after version 3.0. (For details, see the following section, Software enhancements and fixes.) The following instructions explain how to install the 3-DNS Controller, version 3.0 PTF-01 onto existing systems running version 3.0.
The following instructions explain how to install 3-DNS Controller, version 3.0 PTF-01 onto existing systems running version 3.0.
Apply the PTF to 3-DNS Controller, version 3.0 using the following process:
- Change to the /var/tmp/ directory:
cd /var/tmp/ - Connect to the F5 Networks FTP site at ftp.f5.com (contact your vendor to get a user ID and password for the F5 FTP site).
- Download the following upgrade file:
3dns3.0PTF-01.tar - Extract the kit file in the /var/tmp/ directory, by typing the following command:
tar -xvf 3dns3.0PTF-01.tar - Run the upgrade_ptf script in the /var/tmp/
directory to install the PTF, by typing the following command:
./upgrade_ptf
Once you install the software upgrade, refer to the Required configuration changes section for important information about configuration changes you must make on the 3-DNS Controller.
Software enhancements and fixes
What's fixed in this PTF
CERT Advisory CA-2002-03, Multiple Vulnerabilities in Many
Implementations of the Simple Network Management Protocol (SNMP)
The security vulnerabilities that are outlined in CERT Advisory CA-2002-03, Multiple Vulnerabilities in Many
Implementations of the Simple Network Management Protocol (SNMP), have been fixed.
CERT Advisory CA-2002-17, Apache Web Server Chunk Handling Vulnerability
The security vulnerability that is outlined in CERT Advisory CA-2002-17, Apache Web Server Chunk Handling Vulnerability, has been fixed.
CERT Advisory CA-2002-18, OpenSSH Vulnerabilities in Challenge Response Handling
The OpenSSH software running on the 3-DNS Controller has been upgraded to version 3.4p1 to address the security vulnerability that is outlined in CERT Advisory CA-2002-18.
CERT Advisory CA-2002-19, Buffer Overflow in Multiple DNS Resolver Libraries
The buffer overflow vulnerability in DNS resolver libraries that is outlined in CERT Advisory CA-2002-19 has been fixed.
Configuration changes
The following section provides information about both required and optional configuration changes.
Required configuration changes
The current release has no required configuration changes.