Manipulated data causes BIND DNS servers to crash
From http://h-online.com/-1708087
Quote:
An advisoryGerman language link from the Austrian national CERT warns that the free DNS server BIND, which is maintained by the Internet Systems Consortium (ISC), contains a security vulnerability that allows attackers to crash it using specially crafted data records.
The ISC says that resource records with RDATA fields that exceed 65535 bytes cause the domain name server to crash the next time this record is queried.
|
__________________
You don't need to be a genius to debug a pf.conf firewall ruleset, you just need the guts to run tcpdump
|