DNS server attacks begin using BIND software flaw

Attackers have started exploiting a flaw in the most widely used software for the DNS (Domain Name System), which translates domain names into IP addresses.

Last week, a patch was issued for the denial-of-service flaw, which affects all versions of BIND 9, open-source software originally developed by the University of California at Berkeley in the 1980s.

The flaw can be exploited with a single packet, crashing both authoritative and recursive DNS servers. Security analysts predicted...

What feeling does this article give you?

#hashtags to follow:

Attackers [+]    DNS [+]    Domain Name System [+]    BIND 9 [+]    California [+]    Berkeley [+]   

More #news: