ISC warns of a vulnerability in dns software, Bind 9

0
394

The Internet Systems Consortium warns for a vulnerability in the widely used Bind 9 dns server software. By a manipulated ip packet to a dns server would send an attacker to exploit this collapse.

Version 9 of Bind, which stands for Berkeley Internet Name Daemon, is the most commonly used dns server. The Internet Systems Consortium notes, however, that in a large number of versions from the 9.x-series a vulnerability is found, which covers both authorative as recursive Bind 9 servers.

According to the ISC, an attacker could create a Bind 9 server to shut down by a specially modified ip packet to send. This allows the dns system to be in trouble. The problems occur in both the 9.6 x, 9.7 x and 9.8 x-series. There would be currently no workarounds are known to have dns servers to be secure, all would be firewalls with packetfilters attacks can stop. The ISC proposes that the administrators of the dns server can upgrade to Bind 9.6-ESV-R4-P3, 9.7.3-P3 or 9.8.0-P4.