Zero-day attack fingered for global DNS crashes

By on
Zero-day attack fingered for global DNS crashes

Internet Systems Consortium releases temporary patch.

The Internet Systems Consortium (ISC) has issued patches for its BIND 9 domain name server software after an "unidentified network event" caused global servers to crash last week.

BIND 9 is the most widely used DNS server on the internet, meaning the flaw could have a massive impact.

Security experts have speculated that a zero-day vulnerability could have caused the open source DNS software to crash.

"Organisations across the internet reported crashes interrupting service on BIND 9 nameservers performing recursive queries," the ISC said in an advisory.

"An as-yet unidentified network event caused BIND 9 resolvers to cache an invalid record, subsequent queries for which could crash the resolvers with an assertion failure.

"ISC is working on determining the ultimate cause by which a record with this particular inconsistency is cached."

ISC, which manages the BIND software, has issued patches to prevent servers from crashing.

"At this time we are making available a patch which makes [names] recover gracefully from the inconsistency, preventing the abnormal exit," it added.

Security intelligence firm Rapid7 said the first attack was discovered at The National Weather Service, with the following 89 discoveries of the attack on US universities.

"Bind 9 is the most widely used DNS server on the internet today… Gone unchecked, this attack could potentially affect nearly the entire internet," said Matt Barrett, senior solutions architect at Rapid7.

"A temporary patch has already been released, but we encourage everyone to submit packet-capture from their own systems to ISC so they can further investigate. As with any attack, the more information gathered, the better we’ll be."

This article originally appeared at

Copyright © ITPro, Dennis Publishing

Most Read Articles

Log In

|  Forgot your password?