Thursday, August 28, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Nero 2015 is Coming At IFA
LaCie Ships the 48 TB Thunderbolt 2 Storage Solution
ALCATEL ONETOUCH Launches New Affordable Smartphones
ZOTAC Debuts the ZBOX PI320 pico
Dropbox Now Offers 1TB Pro plan for 10 Dollars
HTC Reveals Entry-level Desire 510 Powered By a 64-bit Processor
Archos To Showcase Windows And Android Devices At IFA
Larger iPad Coming Next Year
Active Discussions
help questions structure DVDR
Made video, won't play back easily
Questions durability monitor LCD
Questions fungus CD/DVD Media, Some expert engineer in optical media can help me?
CD, DVD and Blu-ray burning for Android in development
IBM supercharges Power servers with graphics chips
Werner Vogels: four cloud computing trends for 2014
Video editing software.
 Home > News > General Computing > ISC Pat...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, June 06, 2013
ISC Patches Denial-of-service Vulnerability Found In BIND 9


The Internet Systems Consortium (ISC) has released a new versions of the BIND DNS (Domain Name System) software that contain a fix for a defect that could be used to remotely crash DNS servers.

ISC is the the organization that develops and maintains the BIND DNS (Domain Name System) software, the most widely used DNS server software and the standard DNS software on many Unix-like systems, including Linux, Solaris and Mac OS X.

The bug had been discovered in the most recent releases of BIND 9 and had the potential for deliberate exploitation as a denial-of-service attack. By sending a recursive resolver a query for a record in a specially malformed zone, an attacker can cause BIND 9 to exit with a fatal "RUNTIME_CHECK" error in resolver.

ISC says that no intentional exploitation of the bug has been observed in the wild. The existence of the issue has been disclosed on an open mailing list with enough accompanying detail to reverse engineer an attack and ISC is therefore treating this as a Type II (publicly disclosed) vulnerability.

The vulnerability Versions affected BIND 9.6-ESV-R9, 9.8.5, and 9.9.3.

ISC recommends to upgrade to the patched release most closely related to your current version of BIND. These can all be downloaded from http://ftp.isc.org/isc/bind9


Previous
Next
Foxconn May Lose The "Conn"        All News        NSA Collects Verizon Phones' Records, White House Confirms
Foxconn May Lose The "Conn"     General Computing News      Microsoft, FBI And Others Join Forces to Combat Cybercrime Ring

Get RSS feed Easy Print E-Mail this Message

Related News
Russian Law To Restrict Web Hosting Abroard
Researchers Propose New Web technology That Would Transform The Web Into A Secure Database
Video To Consume Most Internet Traffic In The Near Future
Internet to Reach 3 Billion Users Although Majority Still Not Online
Mobile-broadband Penetration Approaching 32 Percent
Cisco To Invest $150 million To Start-ups
Millenniata Launches 25GB M-Disc Blu-ray
Cisco Network Equipment To Support The OpFlex Protocol
AT&T, Cisco, GE, IBM, and Intel Form The Industrial Internet Consortium
Cisco Makes Gigabit Wi-Fi More Affordable
Cisco To Spend $1 billion On Cloud Computing Service
The Internet Inventor Calls For An Open Web

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .