Tuesday, April 24, 2018
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
First-Quarter Lobbying Expenditures: Google, AT&T, Comcast and Comcast Remain Top Spenders
Samsung Launches Six Original Series on Samsung VR Video Service on Gear VR
Facebook Says Users Are Not Products, the Social Network Is
European Regulators Investigate Apple's Proposed Acquisition of Shazam
Amazon is Working on Home Robots: report
7nm Volume Production to Fuel TSMC's Profits This Year
Toshiba Weighs Memory Chip Unit Options
Google Chat Launches to compete with Apple's iMessage
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > ISC Pat...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, June 06, 2013
ISC Patches Denial-of-service Vulnerability Found In BIND 9


The Internet Systems Consortium (ISC) has released a new versions of the BIND DNS (Domain Name System) software that contain a fix for a defect that could be used to remotely crash DNS servers.

ISC is the the organization that develops and maintains the BIND DNS (Domain Name System) software, the most widely used DNS server software and the standard DNS software on many Unix-like systems, including Linux, Solaris and Mac OS X.

The bug had been discovered in the most recent releases of BIND 9 and had the potential for deliberate exploitation as a denial-of-service attack. By sending a recursive resolver a query for a record in a specially malformed zone, an attacker can cause BIND 9 to exit with a fatal "RUNTIME_CHECK" error in resolver.

ISC says that no intentional exploitation of the bug has been observed in the wild. The existence of the issue has been disclosed on an open mailing list with enough accompanying detail to reverse engineer an attack and ISC is therefore treating this as a Type II (publicly disclosed) vulnerability.

The vulnerability Versions affected BIND 9.6-ESV-R9, 9.8.5, and 9.9.3.

ISC recommends to upgrade to the patched release most closely related to your current version of BIND. These can all be downloaded from http://ftp.isc.org/isc/bind9


Previous
Next
Foxconn May Lose The "Conn"        All News        NSA Collects Verizon Phones' Records, White House Confirms
Foxconn May Lose The "Conn"     General Computing News      Microsoft, FBI And Others Join Forces to Combat Cybercrime Ring

Get RSS feed Easy Print E-Mail this Message

Related News
New Arm SoC Solution Enables Rapid Development of Secure IoT Devices
Microsoft Announces IoT Security Solution and Protection in Microsoft 365
Mozilla's "Project Things" Framework Connects Your Devices to the Web
Cisco, Apple, Aon, Allianz Introduce Cyber Risk Management Solution
Samsung Announces First Open Connectivity Foundation 1.3 Certified System-on-Module
China's Xi Says Country's Door To The Internet World Will Open Wider
Samsung Unveils New Hardware/Software Turn-Key Solution For IoT Data Security
Samsung Unifies IoT Services Under SmartThings, Announces Bixby 2.0, AR Capabilities to Galaxy smartphones, a 360 Round Camera
Dell is Doubling Down on the Internet of Things
Samsung Electronics to Unveil Smart IoT System For Buildings
Intel Secure Device Onboard Makes onboarding of Billions of Devices Simpler
Panasonic Touts 1TB Optical Disc For Storing Cold Data

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2018 - All rights reserved -
Privacy policy - Contact Us .