Sunday, June 24, 2018
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
FCC to Seek for Flexible Use of C-band and 6GHz Airwaves
AMD Presents Modular Routing Design for Chiplet-based Systems
Software Business Continues to Work For BlackBerry
Apple Turns to the U.S. Patent Office to Invalidate Qualcomm Patents
Samsung Patents Bezel-less, Notch-free Smartphone Design
China is Home to Most Smartphone Vendors
VidCon 2018: Youtube Announces Memberships, Merchandise as Alternatives to Ads
Chatting With Google Assistant Gets More Natural
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > ISC Pat...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, June 06, 2013
ISC Patches Denial-of-service Vulnerability Found In BIND 9


The Internet Systems Consortium (ISC) has released a new versions of the BIND DNS (Domain Name System) software that contain a fix for a defect that could be used to remotely crash DNS servers.

ISC is the the organization that develops and maintains the BIND DNS (Domain Name System) software, the most widely used DNS server software and the standard DNS software on many Unix-like systems, including Linux, Solaris and Mac OS X.

The bug had been discovered in the most recent releases of BIND 9 and had the potential for deliberate exploitation as a denial-of-service attack. By sending a recursive resolver a query for a record in a specially malformed zone, an attacker can cause BIND 9 to exit with a fatal "RUNTIME_CHECK" error in resolver.

ISC says that no intentional exploitation of the bug has been observed in the wild. The existence of the issue has been disclosed on an open mailing list with enough accompanying detail to reverse engineer an attack and ISC is therefore treating this as a Type II (publicly disclosed) vulnerability.

The vulnerability Versions affected BIND 9.6-ESV-R9, 9.8.5, and 9.9.3.

ISC recommends to upgrade to the patched release most closely related to your current version of BIND. These can all be downloaded from http://ftp.isc.org/isc/bind9


Previous
Next
Foxconn May Lose The "Conn"        All News        NSA Collects Verizon Phones' Records, White House Confirms
Foxconn May Lose The "Conn"     General Computing News      Microsoft, FBI And Others Join Forces to Combat Cybercrime Ring

Get RSS feed Easy Print E-Mail this Message

Related News
Sony SPRESENSE IoT Boards Come With Multi-core CPU and GNSS Receiver Onboard
Ritek to Produce Panasonic's 300GB Archival Discs
New Arm SoC Solution Enables Rapid Development of Secure IoT Devices
Microsoft Announces IoT Security Solution and Protection in Microsoft 365
Mozilla's "Project Things" Framework Connects Your Devices to the Web
Cisco, Apple, Aon, Allianz Introduce Cyber Risk Management Solution
Samsung Announces First Open Connectivity Foundation 1.3 Certified System-on-Module
China's Xi Says Country's Door To The Internet World Will Open Wider
Samsung Unveils New Hardware/Software Turn-Key Solution For IoT Data Security
Samsung Unifies IoT Services Under SmartThings, Announces Bixby 2.0, AR Capabilities to Galaxy smartphones, a 360 Round Camera
Dell is Doubling Down on the Internet of Things
Samsung Electronics to Unveil Smart IoT System For Buildings

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2018 - All rights reserved -
Privacy policy - Contact Us .