Stories
Slash Boxes
Comments

SoylentNews is people

Submission Preview

Link to Story

DNS server attacks begin using BIND software flaw

Accepted submission by Arthur T Knackerbracket at 2015-08-03 17:38:30
/dev/random

Story automatically generated by StoryBot Version 0.0.1d (Development).

Note: This is the complete story and will need further editing. It may also be covered by Copyright and thus should be acknowledged and quoted rather than printed in its entirety.

FeedSource: [ComputerWorld] collected from rss-bot logs

Time: 2015-08-03 10:19:34 UTC

Original URL: http://www.computerworld.com/article/2955290/security/dns-server-attacks-begin-using-bind-software-flaw.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+computerworld%2Fnews%2Ffeed+%28Latest+from+Computerworld%29#tk.rss_all [computerworld.com]

Title: DNS server attacks begin using BIND software flaw

Suggested Topics by Probability (Experimental) : 28.6 science 28.6 OS 21.4 hardware 7.1 security 7.1 careers 7.1 breaking

--- --- --- --- --- --- --- Entire Story Below --- --- --- --- --- --- ---

DNS server attacks begin using BIND software flaw

Attackers have started exploiting a flaw in the most widely used software for the DNS (Domain Name System), which translates domain names into IP addresses.

Last week, a patch was issued for the denial-of-service flaw, which affects all versions of BIND 9 [computerworld.com], open-source software originally developed by the University of California at Berkeley in the 1980s.

The flaw can be exploited with a single packet, crashing both authoritative and recursive DNS servers. Security analysts predicted that attackers would quickly figure out how to exploit the flaw, which has now happened.

"We can confirm that the attacks have begun," wrote [sucuri.net] Daniel Cid, CTO and founder of the security company Sucuri, in a blog post "DNS is one of the most critical parts of the Internet infrastructure, so having your DNS go down, it also means your email, HTTP and all other services will be unavailable."

There's no workaround for the flaw, so administrators need to patch to stop attacks. Major Linux distributions including Red Hat, CentOS and Ubuntu have issued patches, but it is still up to admins to apply it and restart their BIND servers.

Cid wrote via email that at least two of Sucuri's clients within different industries had seen their DNS servers crash due to attacks.

Both are popular websites that had been hit by distributed denial-of-service attacks before, "so it made sense to see them being targeted first," he wrote Sunday.

A successful attack will leave a trace in server logs, Cid wrote. The command "ANY TKEY" should appear as long as admins have querylog enabled.

The patch and advisory from the Internet Systems Consortium is available here [isc.org].


Original Submission