BIND vulnerability

Posted by wjl on Jul 26, 2007 4:48 PM EDT
LXer.com; By wjl
Mail this story
Print this story

Whoever runs a version 9 of BIND (more than 50% of the internet is using it as their DNS) in a configuration as a caching name server should read CVE-2007-2925, Trusteer, or the Internet Storm Center, and upgrade their systems.

The type of vulnerability is called “DNS cache poisoning“, which could lead users to other web sites than they think they are using, turning them into easy victims for phishing and other criminal attacks.>/p>

Users of the Debian GNU/Linux operating system can simply ‘apt-get update’ and ‘apt-get upgrade’, and have the problem solved.



See also: Heise Security in English and in German, or my own page at



wolfgang.lonien.de

  Nav
» Read more about: Story Type: Security; Groups: Community, Linux

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.