A bug in BIND 9 makes it for hackers possible to dns servers to crash. The Internet Systems Consortium, the open source dns software manages, has now released patches for fixing the error.
BIND, or Berkeley Internet Name Domain, is the most commonly used software for dns servers. Version 9 of BIND crashes, however, if it is a not yet further specified request and tries to process and an error message in the log files trying to write. The bug is in the log files identified by the text ” INSIST(! dns_rdataset_isassociated(sigrdataset))’. Due to the crash, the dns server can then no more forwarding to the correct address because BIND refuses to queries to process.
The Internet Systems Consortium, the organization that the BIND software maintains, reports that server administrators that the open source dns software run a quick patch should install to the bug in BIND 9 to remedy the problem. According to ISC, there is an extra hurry because the error in the software, because hackers abused it can be to dns servers flat. In the United States would all such attacks are successfully carried out. Potentially, even the traffic on the internet significantly distorted if there are large-scale attacks take place on BIND 9 servers.