Attackers are exploiting a recently patched high-severity DoS flaw in BIND | Homeland Security Degrees

Attackers are exploiting a recently patched high-severity DoS flaw in BIND | Homeland Security Degrees

https://homelandsecurityedus.wordpress.com/2016/10/13/attackers-are-exploiting-a-recently-patched-high-severity-dos-flaw-in-bind/





Attackers are exploiting a recently patched high-severity DoS flaw, tracked as CVE-2016-2776, in the in the popular DNS software in BIND.



Last month a vulnerability in the popular DNS software BIND, tracked as CVE-2016-2776, has been patched. The flaw could be exploited by a remote attacker to trigger a DoS condition using specially crafted DNS packets. The high severity flaw initially discovered by the Internet Systems Consortium (ISC) was fixed with the release of BIND 9.9.9-P3, 9.10.4-P3 and 9.11.0rc3.



“Testing by ISC has uncovered a critical error condition which can occur when a nameserver is constructing a response. A defect in the rendering of message…

To learn more visit: Security Affairs



The post Attackers are exploiting a recently patched high-severity DoS flaw in BIND appeared first on Homeland Security Degrees.





Attackers are exploiting a recently patched high-severity DoS flaw in BIND