Bugs put widely used DNS software at risk
Finnish researchers uncover a variety of holes
IDG News Service - A number of flaws in the software that is used to administer the Internet's Domain Name System have been discovered by researchers at Finland's University of Oulu.
The vulnerabilities could be exploited to "cause a variety of outcomes," including crashing the DNS server or possibly providing attackers with a way to run unauthorized software, according to an advisory, posted today by the U.K.'s National Infrastructure Security Co-ordination Centre.
Oulu researchers have created a DNS test suite that can be used to test for these vulnerabilities, and a number of DNS software providers, including Juniper Networks Inc. and the Internet Software Consortium, have confirmed that some of their products are vulnerable.
The bug found in the Internet Software Consortium's BIND (Berkeley Internet Name Domain) software is "not considered high-risk," the researchers said. Hitachi Ltd. and Wind River Systems Inc. have said that their products are not affected.
Microsoft Corp., Cisco Systems Inc. and Sun Microsystems Inc. are testing their products and could not immediately say whether customers would be affected.
Collectively the world's DNS servers manage the Internet's system for converting easy-to-remember Web addresses, like Google.com, into the unique IP addresses that are used by machines.
These servers have come under increasing scrutiny because recent attacks have shown how the DNS system could potentially be compromised to bring down a large number of Web sites.
Last month, VeriSign Inc. revealed that unknown attackers had used compromised computers and DNS servers to launch a denial-of-service attack against about 1,500 organizations.
Shortly after that attack was publicized, hackers attacked DNS servers at Network Solutions Inc., and Joker.com, a domain-name registrar based in Germany. Both of these events ended up disrupting service to customers.
More information, including a list of vendor comments on these latest vulnerabilities can be found on the U.K. National Infrastructure Security Co-ordination Centre site.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Security for Virtualization In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented...
- Is Your Big Data Solution Production-Ready? Read "Is Your Big Data Solution Production-Ready?" now, and discover best practices and actionable steps to implementing a production-ready big data solution.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Malware and Vulnerabilities White Papers | Webcasts