Archive for the tag 'bind vulnerability'

Nick

*** DNS Service Vulnerability ***

A vulnerability has been detected in the way some Domain Name System (DNS) services handle recursive DNS queries. The DNS is responsible for translating host names to IP addresses and is critical for the normal operation of internet-connected systems. DNS cache poisoning (sometimes referred to as cache pollution) is an attack technique that allows an attacker to introduce forged DNS information into the cache of a caching nameserver. Older versions of the BIND (Berkeley Internet Name Domain) DNS service and the Microsoft DNS service have been found to be susceptible to the poisoning of cached recursive resolvers with spoofed data If you are running any 3rd party DNS service you should check your server for vulnerabilities or updates immediately. You should upgrade your server as soon as possible to prevent any issues from occurring.

If you wish to have your DNS server upgraded please purchase a ServerBuddies Hour of Support plan and we will do it straight away.

* ServerBuddies Team