Serious Flaws Found in BIND Server Software
Security researchers have discovered several serious new vulnerabilities in the BIND software that runs on the vast majority of the Internet's DNS servers.Security researchers have discovered several serious new vulnerabilities in the BIND software that runs on the vast majority of the Internets DNS servers. The most serious flaw, a buffer overrun in both BIND 4 and BIND 8, enables an attacker to execute arbitrary code on a vulnerable server. The Internet Software Consortium, which maintains the free BIND (Berkeley Internet Name Domain) software, has released patches for both affected versions. An attacker who controls an authoritative DNS server can instruct BIND to cache DNS information in its internal database. In order for this to happen, the server must have recursion enabled, which is the default setting. There is a flaw in the formation of the responses that contain SIG resource records to requests for cached DNS information.
An attacker who exploited this flaw could execute any code of choice on the affected server, according to a bulletin published Tuesday by Internet Security Systems Inc.s X-Force research team.