Sunday, January 25, 2015
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
NVIDIA Comments On GeForce GTX 970 Memory Allocation Reports
Google Comments On Lack Of Security Patches On Older Android Phones
Sony is Offering Old Games To Settle The 2011 PlayStation Network Breach
Sony Postpones Earnings Announcement
January Windows 10 Build Released Through The Windows Insider Program
Flexible Computers Are Stil Away From Reality
China Denies Microsoft Outlook Hacking Allegations
A Look at Microsoft's New Spartan Browser
Active Discussions
HELP!!!
full screen wide screen
UDF errors
Hi
The Simplest Way to Download KODAK HERO 7.1 Driver
About the restriction problem of chapter quantity in DVD
Booktype utilities for LiteON and OEM DVD Recorders
downgrade a nero vision 5 project to nero vision 2
 Home > News > General Computing > ISC Pat...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, June 06, 2013
ISC Patches Denial-of-service Vulnerability Found In BIND 9


The Internet Systems Consortium (ISC) has released a new versions of the BIND DNS (Domain Name System) software that contain a fix for a defect that could be used to remotely crash DNS servers.

ISC is the the organization that develops and maintains the BIND DNS (Domain Name System) software, the most widely used DNS server software and the standard DNS software on many Unix-like systems, including Linux, Solaris and Mac OS X.

The bug had been discovered in the most recent releases of BIND 9 and had the potential for deliberate exploitation as a denial-of-service attack. By sending a recursive resolver a query for a record in a specially malformed zone, an attacker can cause BIND 9 to exit with a fatal "RUNTIME_CHECK" error in resolver.

ISC says that no intentional exploitation of the bug has been observed in the wild. The existence of the issue has been disclosed on an open mailing list with enough accompanying detail to reverse engineer an attack and ISC is therefore treating this as a Type II (publicly disclosed) vulnerability.

The vulnerability Versions affected BIND 9.6-ESV-R9, 9.8.5, and 9.9.3.

ISC recommends to upgrade to the patched release most closely related to your current version of BIND. These can all be downloaded from http://ftp.isc.org/isc/bind9


Previous
Next
Foxconn May Lose The "Conn"        All News        NSA Collects Verizon Phones' Records, White House Confirms
Foxconn May Lose The "Conn"     General Computing News      Microsoft, FBI And Others Join Forces to Combat Cybercrime Ring

Get RSS feed Easy Print E-Mail this Message

Related News
Toshiba Reorganization to Strengthen IoT-Related Business
Verbatim-MKM To Manufacture And Sell Archival-Grade M-Discs
Toshiba Develops Cloud System for Instantaneous Remote Control of One Million Devices
Samsung CEO Calls For IoT Openness, New Galaxy E5 and E7 Smartphones Announced
CES 2015 Focuses On The Internet Of Things
Google Seeks For Research Proposals For "Web of Things"
Cisco Wants To Analyze Everything
Intel Unifies and Simplifies Connectivity for IoT
Internet Access Considered Human Right: survey
Internet Architecture Board Recommends The Use Of Encryption-by-Default for the Internet
Toshiba and Cisco To Collaborate In Internet of Things Solutions
Obama Outlines Plan for a Free and Open Internet

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2015 - All rights reserved -
Privacy policy - Contact Us .