Organizations domestically and possible worldwide are being impacted by a threat to the BIND DNS server code. The Domain Name System is the Internet's phone book. It's used to
convert domain and host names into numerical Internet Protocol (IP)
addresses that computers need to communicate with each other. The DNS is
made up of a global network of servers and a very large number of them
run BIND, a software package developed and maintained by a nonprofit
corporation called the Internet Systems Consortium (ISC).
The vulnerability announced and patched by ISC Tuesday is critical because it can be used to crash both authoritative and recursive DNS servers with a single packet.
Are you and your clients experiences the consequences of the BIND DNS threat? Let us know here at the Cloud and Cyber Security Center. Our goal is to identify valid mitigation tactics for your infrastructure. For tips on the BIND DNS issue see: http://www.tldp.org/HOWTO/DNS-HOWTO-5.html
The vulnerability announced and patched by ISC Tuesday is critical because it can be used to crash both authoritative and recursive DNS servers with a single packet.
Are you and your clients experiences the consequences of the BIND DNS threat? Let us know here at the Cloud and Cyber Security Center. Our goal is to identify valid mitigation tactics for your infrastructure. For tips on the BIND DNS issue see: http://www.tldp.org/HOWTO/DNS-HOWTO-5.html
No comments:
Post a Comment