Friday, September 04, 2015
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
BlackBerry To Buy Rival Good Technology
GIGABYTE Z170X-UD5 Motherboard Is Intel Thunderbolt 3 Certified
LG Bets On OLED's Success, Showcases Innovative Prototypes At IFA2015
Acer's Predator 6 Smartphone Packs A 10-core Processor
New Intuos Tablets Bring Your Creative Dreams Closer
Fujitsu Doubles Same-Cell Wireless Communication Capacity for 5G
Justice Department Hardens Cellphone Tracking Rules
ALCATEL ONETOUCH Unveiled Its Latest Smartphones And A Smartwatch at IFA
Active Discussions
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
How to burn a backup copy of The Frozen Throne
Help make DVDInfoPro better with dvdinfomantis!!!
Copied dvd's say blank in computer only
menu making
Optiarc AD-7260S review
 Home > News > General Computing > ISC Pat...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, June 06, 2013
ISC Patches Denial-of-service Vulnerability Found In BIND 9


The Internet Systems Consortium (ISC) has released a new versions of the BIND DNS (Domain Name System) software that contain a fix for a defect that could be used to remotely crash DNS servers.

ISC is the the organization that develops and maintains the BIND DNS (Domain Name System) software, the most widely used DNS server software and the standard DNS software on many Unix-like systems, including Linux, Solaris and Mac OS X.

The bug had been discovered in the most recent releases of BIND 9 and had the potential for deliberate exploitation as a denial-of-service attack. By sending a recursive resolver a query for a record in a specially malformed zone, an attacker can cause BIND 9 to exit with a fatal "RUNTIME_CHECK" error in resolver.

ISC says that no intentional exploitation of the bug has been observed in the wild. The existence of the issue has been disclosed on an open mailing list with enough accompanying detail to reverse engineer an attack and ISC is therefore treating this as a Type II (publicly disclosed) vulnerability.

The vulnerability Versions affected BIND 9.6-ESV-R9, 9.8.5, and 9.9.3.

ISC recommends to upgrade to the patched release most closely related to your current version of BIND. These can all be downloaded from http://ftp.isc.org/isc/bind9


Previous
Next
Foxconn May Lose The "Conn"        All News        NSA Collects Verizon Phones' Records, White House Confirms
Foxconn May Lose The "Conn"     General Computing News      Microsoft, FBI And Others Join Forces to Combat Cybercrime Ring

Get RSS feed Easy Print E-Mail this Message

Related News
IBM and ARM Collaborate to Accelerate Delivery of Internet of Things
Samsung IoT Device Will Take Care Of Your Sleep
Technicolor Takes Over Cisco's Set-top box Business
Samsung Opens IoT Development Platform
Acer Focuses On Enerprise IoT With New Platform
Toshiba Partners with Microsoft to Deliver New Internet of Things Solutions
Atmel Showcases System Solution for Wearables at Computex 2015
ARM Announces New Cortex-M Design For IoT Chips
Netflix, Google And Facebook Among the Most Popular Online Destinations
Should We Expect Android OS For IoT Next Week?
Huawei Launches New Platfom, Operating system For IoT Devices
Samsung Details New Artik Chipset for IoT Devices

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2015 - All rights reserved -
Privacy policy - Contact Us .