Internet Systems Consortium Inc. says users of the Berkeley Internet Name Domain (BIND) Server could face denial of service attacks if they do not update to a newer version. Internet Systems Consortium Inc. says users of the Berkeley Internet Name Domain (BIND) Server could face denial of service attacks if they do not update to a newer version. The Redwood City, Calif.-based non-profit organization published an urgent warning this week of a dynamic update message that could cause BIND servers that are masters for one or more zones to exit. ISC advises users to update to either version 9.4.3-P3, 9.5.1-P3 or 9.6.1-P1 “This is a widespread issue,” said Richard Hyatt, chief technology officer of Toronto, Canada-based Bluecat Networks Inc., which makes IP address management products. “It’s far worse than Kaminsky.” Hyatt was referring to a vulnerability in the Web sites protected by Secure Sockets Layer first revealed at last year’s Black Hat security conference by Dan Kaminsky, director of penetration testing for IOActive. “With Kaminsky, they were poisoning the cache,” Hyatt said. “With this one, people will just take you offline right away.” James Quin, senior research analyst with Info-Tech Research Group of London, Canada, agreed. “We’re looking at the shutdown of domain name servers,” Quin said. “The routing of IP traffic would effectively come to a halt until the system is brought back online.” In its alert, ISC said users who get a “dynamic update message” for their BIND servers may see BIND taken offline if they are using version 9. “This is a case of a bad line of code,” Hyatt said, adding Bluecat has posted an update for its Adonis IP address management hardware. Fortunately, it’s easy to rectify, Quin said. “It’s only likely to be companies that aren’t staying on top of their security protocols that will be affected,” Quin said. “They can very quickly rectify the situation.” He added attacks on telecom carriers are more serious than attacks on individual corporations. “The impact I can cause at the individual business level is pretty minimal,” he said. “More threats will be launched on carriers than individual companies.” A spokesperson for Bell Canada did not want to go into detail on the technology the carriers uses, for competitive reasons, but did say Bell is “not vulnerable.” Quin said users should not assume every carrier is properly patched. Hyatt said companies who are vulnerable could experience problems other than losing their Web site. “It can mutate into a worm or virus that if it gets launched from internal parts of network could attack internal servers running bind,” Hyatt said. “It could take down parts of company from inside.” Related content BrandPost How Infosys and Tennis Australia are harnessing technology for good By Veronica Lew Mar 26, 2023 6 mins Infosys BrandPost Retail innovation playbook: Fast, economical transformation on Microsoft Cloud For retailers, tight integration of data and systems is the antidote to a challenging economy. By Tata Consultancy Services Mar 24, 2023 3 mins Retail Industry Digital Transformation BrandPost How retailers are empowering business transformation with TCS and Microsoft Cloud AI-powered omnichannel integration and a strong, secure digital core lets retailers innovate across four primary areas while staying compliant, maintaining security and preventing fraud. By Tata Consultancy Services Mar 24, 2023 4 mins Retail Industry Cloud Computing BrandPost How to Build ROI from Cloud Migration This whitepaper and webcast can help you calculate the ROI and create a business case for modernizing your legacy applications to the Microsoft Cloud. By Tata Consultancy Services Mar 24, 2023 1 min Retail Industry Cloud Computing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe