[MaraDNS list] DNS under exploited attack?
david sevilla
dsevilla00 at hotmail.com
Wed Nov 16 08:56:23 EST 2011
I wonder if Anon or/and lulzsec are involved :P
> Date: Wed, 16 Nov 2011 13:19:12 +0100
> To: list at maradns.org
> From: jefsey at jefsey.com
> CC: support at easydns.com
> Subject: [MaraDNS list] DNS under exploited attack?
>
> FYI - in case this would be a new form of DoS.
> -----
>
> From: Barry Greene <bgreene at isc.org>
> Subject: Update: BIND 9 recursive error being investigated
> To: undisclosed-recipients:;
>
> Interm Security Advisory:
> http://www.isc.org/software/bind/advisories/cve-2011-tbd (CVE will be updated)
>
> Organizations across the Internet are reporting crashes interrupting
> service on BIND 9 nameservers performing recursive queries. Affected
> servers crash after logging an error in query.c with the following
> message: "INSIST(! dns_rdataset_isassociated(sigrdataset))"
>
> Multiple versions are reported as being affected, including all
> currently supported release versions of ISC BIND 9.
>
> ISC is actively investigating the root cause and working to produce
> patches which avoid the crash. Further information will be made
> available soon (see the advisory
> http://www.isc.org/software/bind/advisories/cve-2011-tbd).
>
> It is unknown at this time if this is an exploited attack. This is
> under investigation.
>
> Questions, observations, and data is welcomed. Please send to
> security-officer at isc.org.
>
> ----
>
> jfc
>
More information about the list
mailing list