Attackers are exploiting a recently patched high-severity DoS flaw in BIND | Homeland Security Degrees
Attackers are exploiting a recently patched high-severity DoS flaw in BIND | Homeland Security Degrees
https://homelandsecurityedus.wordpress.com/2016/10/13/attackers-are-exploiting-a-recently-patched-high-severity-dos-flaw-in-bind/
Attackers are exploiting a recently patched high-severity DoS flaw, tracked as CVE-2016-2776, in the in the popular DNS software in BIND.
Last month a vulnerability in the popular DNS software BIND, tracked as CVE-2016-2776, has been patched. The flaw could be exploited by a remote attacker to trigger a DoS condition using specially crafted DNS packets. The high severity flaw initially discovered by the Internet Systems Consortium (ISC) was fixed with the release of BIND 9.9.9-P3, 9.10.4-P3 and 9.11.0rc3.
“Testing by ISC has uncovered a critical error condition which can occur when a nameserver is constructing a response. A defect in the rendering of message…
To learn more visit: Security Affairs
The post Attackers are exploiting a recently patched high-severity DoS flaw in BIND appeared first on Homeland Security Degrees.
Attackers are exploiting a recently patched high-severity DoS flaw in BIND