DoS Flaws Haunt BIND Server Software | Channel Insider

DoS Flaws Haunt BIND Server Software

The nonprofit Internet Systems Consortium has rolled out fixes for a pair of denial-of-service flaws in its BIND (Berkeley Internet Name Domain) implementation of the Domain Name System protocols. The vulnerabilities were reported in BIND versions 8.4.4, 8.4.5 and 9.3.0 and carry a “moderately critical” rating from independent research firm Secunia. BIND is by far […]

Written By
Ryan Naraine
Ryan Naraine
Jan 27, 2005
2 minute read
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

The nonprofit Internet Systems Consortium has rolled out fixes for a pair of denial-of-service flaws in its BIND (Berkeley Internet Name Domain) implementation of the Domain Name System protocols.

The vulnerabilities were reported in BIND versions 8.4.4, 8.4.5 and 9.3.0 and carry a “moderately critical” rating from independent research firm Secunia.

BIND is by far the most popular software for mapping domain names to IP addresses on the Internet. Vulnerabilities in BIND have triggered heated debates in security circles because of the heavy dependence on the software.

The first flaw, which only affects versions 8.4.4 and 8.4.5, is a buffer overflow error in the handling of the “q_usedns” array used by the server to track name servers and addresses that have been queried.

A successful exploit could allow an attacker to crash the service, according to an advisory from the U.S. Computer Emergency Readiness Team.

The ISC has recommended that users disable recursion and glue fetching as a temporary workaround. A comprehensive fix is available in the new ISC BIND version 8.4.6.

The second flaw, which affects BIND version 9.3.0, was found in the way BIND supports the DNS Security Extensions (DNSSEC), including the NextSECure (NSEC) RDATA Format. “An incorrect assumption in the validator function authvalidated() can result in an internal consistency test failing and named exiting,” US-CERT warned in a second advisory.

An attacker with the ability to craft specific DNS packets could exploit this vulnerability to trigger denial-of-service attacks.

Users are urged to disable dnssec validation at the Options/View level and upgrade to the new BIND version 9.3.1.

Check out eWEEK.com’s for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzer’s Weblog.

Recommended for you...

Scale Computing Debuts Velocity Partner Program
Jordan Smith
Apr 16, 2026
AppDirect Acquires PartnerStack for Unified Commerce Platform
Luis Millares
Apr 14, 2026
World Quantum Day 2026: QuSecure on Urgent Need for PQC Shift
Aminu Abdullahi
Apr 14, 2026
RapidScale Set to Announce New Partner Program
Jordan Smith
Apr 14, 2026
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.