Tuesday, June 02, 2015
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Computex: Qualcomm Expands 802.11ac MU-MIMO Product Portfolio for Wi-Fi Access Points and Routers
ASUS Showcases ROG Gaming Products, ROG Certified Gear, Next-Gen Motherboard, USB 3.1 Line-Up and Mods at Computex 2015
Computex: Intel Introduces 5th Gen Intel Core Broadwell-H Processors, Thunderbolt 3, IoT And Unite Tele-conference Platform
Crucial Debuts New DDR4 Memory, SSD Software At Computex
Corsair at Computex 2015
Google To Offer More Privacy Controls
Nintendo's new NX Game Console Could have Android Inside
Intel to Acquire Altera For $16.7 Billion
Active Discussions
Copy a protected DVD?
roxio issues with xp pro
How to burn a backup copy of The Frozen Throne
Help make DVDInfoPro better with dvdinfomantis!!!
Copied dvd's say blank in computer only
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > ISC Pat...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, June 06, 2013
ISC Patches Denial-of-service Vulnerability Found In BIND 9


The Internet Systems Consortium (ISC) has released a new versions of the BIND DNS (Domain Name System) software that contain a fix for a defect that could be used to remotely crash DNS servers.

ISC is the the organization that develops and maintains the BIND DNS (Domain Name System) software, the most widely used DNS server software and the standard DNS software on many Unix-like systems, including Linux, Solaris and Mac OS X.

The bug had been discovered in the most recent releases of BIND 9 and had the potential for deliberate exploitation as a denial-of-service attack. By sending a recursive resolver a query for a record in a specially malformed zone, an attacker can cause BIND 9 to exit with a fatal "RUNTIME_CHECK" error in resolver.

ISC says that no intentional exploitation of the bug has been observed in the wild. The existence of the issue has been disclosed on an open mailing list with enough accompanying detail to reverse engineer an attack and ISC is therefore treating this as a Type II (publicly disclosed) vulnerability.

The vulnerability Versions affected BIND 9.6-ESV-R9, 9.8.5, and 9.9.3.

ISC recommends to upgrade to the patched release most closely related to your current version of BIND. These can all be downloaded from http://ftp.isc.org/isc/bind9


Previous
Next
Foxconn May Lose The "Conn"        All News        NSA Collects Verizon Phones' Records, White House Confirms
Foxconn May Lose The "Conn"     General Computing News      Microsoft, FBI And Others Join Forces to Combat Cybercrime Ring

Get RSS feed Easy Print E-Mail this Message

Related News
ARM Announces New Cortex-M Design For IoT Chips
Netflix, Google And Facebook Among the Most Popular Online Destinations
Should We Expect Android OS For IoT Next Week?
Huawei Launches New Platfom, Operating system For IoT Devices
Samsung Details New Artik Chipset for IoT Devices
Microsoft Releases Windows 10 for IoT Devices
Toshiba Launches Application Processor Development Platforms for Wearable and IoT Devices
BlackBerry Advances Security of Mobile and Internet of Things
IBM Connects Internet of Things to the Enterprise
Panasonic to Share Intellectual Property to Boost Internet of Things
Cisco IP Phones Vulnerable To Unauthenticated Remote Calls
Toshiba Introduces New APs For For IoT Solutions

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2015 - All rights reserved -
Privacy policy - Contact Us .