Wednesday, April 16, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Researchers Hack Galaxy S5's Fingerprint Scanner
Pioneer's Car Multimedia Systems To Support Apple's CarPlay
Broadcom Doubles Wi-Fi Speed of Devices
Sony Offers New BRAVIA 4K TV Line-Up, Media Player and Content Options
Corning USB 3.Optical Cables Now Available
Toshiba 4K Ultra HD Laptop Retails For $1500
BlackBerry Invests in NantHealth
Ricoh Releases 51.4-Mpixel Pentax 645Z SLR Camera
Active Discussions
help questions structure DVDR
Made video, won't play back easily
Questions durability monitor LCD
Questions fungus CD/DVD Media, Some expert engineer in optical media can help me?
CD, DVD and Blu-ray burning for Android in development
IBM supercharges Power servers with graphics chips
Werner Vogels: four cloud computing trends for 2014
Video editing software.
 Home > News > General Computing > ISC Pat...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, June 06, 2013
ISC Patches Denial-of-service Vulnerability Found In BIND 9


The Internet Systems Consortium (ISC) has released a new versions of the BIND DNS (Domain Name System) software that contain a fix for a defect that could be used to remotely crash DNS servers.

ISC is the the organization that develops and maintains the BIND DNS (Domain Name System) software, the most widely used DNS server software and the standard DNS software on many Unix-like systems, including Linux, Solaris and Mac OS X.

The bug had been discovered in the most recent releases of BIND 9 and had the potential for deliberate exploitation as a denial-of-service attack. By sending a recursive resolver a query for a record in a specially malformed zone, an attacker can cause BIND 9 to exit with a fatal "RUNTIME_CHECK" error in resolver.

ISC says that no intentional exploitation of the bug has been observed in the wild. The existence of the issue has been disclosed on an open mailing list with enough accompanying detail to reverse engineer an attack and ISC is therefore treating this as a Type II (publicly disclosed) vulnerability.

The vulnerability Versions affected BIND 9.6-ESV-R9, 9.8.5, and 9.9.3.

ISC recommends to upgrade to the patched release most closely related to your current version of BIND. These can all be downloaded from http://ftp.isc.org/isc/bind9


Previous
Next
Foxconn May Lose The "Conn"        All News        NSA Collects Verizon Phones' Records, White House Confirms
Foxconn May Lose The "Conn"     General Computing News      Microsoft, FBI And Others Join Forces to Combat Cybercrime Ring

Get RSS feed Easy Print E-Mail this Message

Related News
Millenniata Launches 25GB M-Disc Blu-ray
Cisco Network Equipment To Support The OpFlex Protocol
AT&T, Cisco, GE, IBM, and Intel Form The Industrial Internet Consortium
Cisco Makes Gigabit Wi-Fi More Affordable
Cisco To Spend $1 billion On Cloud Computing Service
The Internet Inventor Calls For An Open Web
Sony And Panasonic Create New "Archival Disc" 300GB Optical Disc Standard
Cisco Reaches Agreement With Innovatio
Cisco and Samsung Enter Patent Cross-License Agreement
Cisco Forecast Nearly 11-Fold Increase in Global Mobile Data Traffic from 2013 to 2018
Google And Cisco Sign Licensing Deal
Cisco Fog Computing Adds More Power To Connected Devices

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .