I applied the patch found here: http://www.isc.org/index.pl?/sw/bind/bind-security.php and re-rolled the bind rpms. However, the dns checker tool (http://www.doxpara.com/) still show me as vulnerable to the buffer overflow. Is anyone else found the small patch to be successful? -Eric Wood