Dark
Light

Exploit BIND DNS weakness, flood servers with DNS messages now

1 min read
82 views

TLDR:

  • Multiple vulnerabilities in the BIND DNS server software have been identified, allowing attackers to disrupt servers and cause denial-of-service conditions.
  • The most critical vulnerability, CVE-2024-0760, lets attackers flood servers with DNS messages over TCP remotely, potentially destabilizing the server.

The Internet Systems Consortium (ISC) has released critical security advisories addressing vulnerabilities in the BIND DNS server software. These vulnerabilities, including CVE-2024-0760, CVE-2024-1737, CVE-2024-1975, and CVE-2024-4076, can lead to denial-of-service (DoS) conditions. An alarming vulnerability, CVE-2024-0760, allows attackers to flood servers with DNS messages remotely over TCP, potentially rendering the server unstable. Another critical vulnerability, CVE-2024-1975, lets attackers exhaust CPU resources using SIG(0) messages. The U.S. CISA has advised users to apply updates immediately to mitigate risks. Previous attacks on DNS services have shown the potential for widespread disruptions, emphasizing the importance of keeping DNS infrastructure secure.

Security Measures for Applying Updates

Assess the potential impact on operations, back up configuration and data, download the latest patches, apply the updates for affected versions, and verify the update to ensure the BIND server is running the latest patched version.

Previous Story

North Korean hackers aim at weapons blueprints, nuclear facilities in cyber attacks

Next Story

DDoS: 6 Days of Digital Mayhem Sets New Cyber Record

Latest from News