[MaraDNS list] DNS under exploited attack?

david sevilla dsevilla00 at hotmail.com
Wed Nov 16 08:56:23 EST 2011


I wonder if Anon or/and lulzsec are involved :P

> Date: Wed, 16 Nov 2011 13:19:12 +0100
> To: list at maradns.org
> From: jefsey at jefsey.com
> CC: support at easydns.com
> Subject: [MaraDNS list] DNS under exploited attack?
> 
> FYI - in case this would be a new form of DoS.
> -----
> 
> From: Barry Greene <bgreene at isc.org>
> Subject: Update: BIND 9 recursive error being investigated
> To: undisclosed-recipients:;
> 
> Interm Security Advisory: 
> http://www.isc.org/software/bind/advisories/cve-2011-tbd (CVE will be updated)
> 
> Organizations across the Internet are reporting crashes interrupting 
> service on BIND 9 nameservers performing recursive queries. Affected
> servers crash after logging an error in query.c with the following 
> message: "INSIST(! dns_rdataset_isassociated(sigrdataset))"
> 
> Multiple versions are reported as being affected, including all 
> currently supported release versions of ISC BIND 9.
> 
> ISC is actively investigating the root cause and working to produce 
> patches which avoid the crash. Further information will be made
> available soon (see the advisory 
> http://www.isc.org/software/bind/advisories/cve-2011-tbd).
> 
> It is unknown at this time if this is an exploited attack. This is 
> under investigation.
> 
> Questions, observations, and data is welcomed. Please send to 
> security-officer at isc.org.
> 
> ----
> 
> jfc
> 
 		 	   		  


More information about the list mailing list