Sunday, November 23, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Samsung Files ITC Complaint Against Nvidia
Europe To Ask Google Unlink Its Commercial And Search Services
Streaming TV Service Aereo Files for Bankruptcy
Square Launches Cash Register Service
Call of Duty: Advanced Warfare is the Biggest Entertainment Launch of 2014
Intel-Micron 3D NAND To Have 32 Layers, 256Gb Per Die
Intel To Release Chromecast-like Thumb-sized PCs
Google Contributor Lets You Pay And And See No Ads In Your Favorite Sites
Active Discussions
cdrw trouble
CDR for car Sat Nav
DVD/DL for Optiarc 7191S at 8X
Copied dvd's say blank in computer only
Made video, won't play back easily
New Features In Firefox 33
updated tests for dvd and cd burners
How to generate lots of different CDs quickly
 Home > News > General Computing > ISC Pat...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, June 06, 2013
ISC Patches Denial-of-service Vulnerability Found In BIND 9


The Internet Systems Consortium (ISC) has released a new versions of the BIND DNS (Domain Name System) software that contain a fix for a defect that could be used to remotely crash DNS servers.

ISC is the the organization that develops and maintains the BIND DNS (Domain Name System) software, the most widely used DNS server software and the standard DNS software on many Unix-like systems, including Linux, Solaris and Mac OS X.

The bug had been discovered in the most recent releases of BIND 9 and had the potential for deliberate exploitation as a denial-of-service attack. By sending a recursive resolver a query for a record in a specially malformed zone, an attacker can cause BIND 9 to exit with a fatal "RUNTIME_CHECK" error in resolver.

ISC says that no intentional exploitation of the bug has been observed in the wild. The existence of the issue has been disclosed on an open mailing list with enough accompanying detail to reverse engineer an attack and ISC is therefore treating this as a Type II (publicly disclosed) vulnerability.

The vulnerability Versions affected BIND 9.6-ESV-R9, 9.8.5, and 9.9.3.

ISC recommends to upgrade to the patched release most closely related to your current version of BIND. These can all be downloaded from http://ftp.isc.org/isc/bind9


Previous
Next
Foxconn May Lose The "Conn"        All News        NSA Collects Verizon Phones' Records, White House Confirms
Foxconn May Lose The "Conn"     General Computing News      Microsoft, FBI And Others Join Forces to Combat Cybercrime Ring

Get RSS feed Easy Print E-Mail this Message

Related News
Internet Architecture Board Recommends The Use Of Encryption-by-Default for the Internet
Toshiba and Cisco To Collaborate In Internet of Things Solutions
Obama Outlines Plan for a Free and Open Internet
Gartner Says the IoT Component Market Is Set for Rapid Growth
North Korea Blocks Foreigners' Access To Facebook, Twitter
Report Details Internet Access Barriers
Inventor Of Internet Calls for Greater Privacy
Verbatim-MKM To Sell And Promote Enter Archival-Grade M-Discs
Russian Law To Restrict Web Hosting Abroard
Researchers Propose New Web technology That Would Transform The Web Into A Secure Database
Video To Consume Most Internet Traffic In The Near Future
Internet to Reach 3 Billion Users Although Majority Still Not Online

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .