Patch: BIND 8 vulnerability

A patch has been released to address a programming error in the BIND 8 DNS server which could "result in a DNS message being incorrectly cached as a negative response." This could lead to a denial of service against legitimate domain names.

For more information, go to:

EnGarde: http://www.linuxsecurity.com/advisories/engarde_advisory-3816.html

FreeBSD: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:19.bind.asc

SuSE: http://www.suse.com/de/security/2003_47_bind8.html

Trustix: http://www.trustix.org/errata/misc/2003/TSL-2003-0044-bind.asc.txt

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about CERT AustraliaSuse

Show Comments