Tuesday, August 04, 2015
Serious exploit possible on Linux servers doing DNS translation, could lead to DOS attacks
Dan Goodin of Ars Technica reports on a serious flaw in the way DNS translation is practiced on Linux servers for many websites, in a service called Bind, story link here.
The flaw would appear to leave websites vulnerable to DOS attacks, or to redirection. This may have happened sporadically in recent months with some small businesses.
The issue would seem to affect administrators at web hosting companies the most, or those who run their own servers.
Sucuri has a blog post on “Bind9”, “denial of service exploit in the wild” here.
In 2008, there was a major concern over the security of the DNS conversion system, enough to cause emergency international meetings to be hosted by Microsoft. These problems had been detected by researchers in Finland. I reported this on my “identity theft” blog on August 9, 2008 (probably not the best place).