Critical BIND denial-of-service flaw could disrupt large portions of the Internet

Soldato
Joined
19 Oct 2002
Posts
5,780
Read, Attackers could exploit a new vulnerability in BIND, the most popular Domain Name System (DNS) server software, to disrupt the Internet for many users.

The vulnerability affects all versions of BIND 9, from BIND 9.1.0 to BIND 9.10.2-P2, and can be exploited to crash DNS servers that are powered by the software.
security tools 1
Top security tools in the fight against cybercrime

There’s no silver bullet, so load up with as many of these as you can.
Read Now

The Domain Name System is the Internet’s phone book. It’s used to convert domain and host names into numerical Internet Protocol (IP) addresses that computers need to communicate with each other. The DNS is made up of a global network of servers and a very large number of them run BIND, a software package developed and maintained by a nonprofit corporation called the Internet Systems Consortium (ISC).
 
It's not critical, it's important .... yes there is a difference.

Given that the patches have been out for several days already I would imagine that the important root DNS servers are long since patched and most competent admins who are running internet facing DNS servers should have patched it by now.

The article is written in a very scaremongering way ... "to crash DNS servers" could be taken to mean that its making computers crash ... when the RHEL security advisory indicates that its just the named process may exit unexpectedly on receipt of the dodgy packet (and in the real world that process is probably being monitored and set to be automatically be restarted)
 
It's not critical, it's important .... yes there is a difference.

Given that the patches have been out for several days already I would imagine that the important root DNS servers are long since patched and most competent admins who are running internet facing DNS servers should have patched it by now.

The article is written in a very scaremongering way ... "to crash DNS servers" could be taken to mean that its making computers crash ... when the RHEL security advisory indicates that its just the named process may exit unexpectedly on receipt of the dodgy packet (and in the real world that process is probably being monitored and set to be automatically be restarted)

Yep agree with all of that. Critical for me is anything that allows RCE

OP should really read the CVE prior to posting :p

http://www.cvedetails.com/vulnerability-list/vendor_id-64/product_id-144/year-2015/ISC-Bind.html
 
Back
Top Bottom