Attackers Use Recent BIND Flaw to Exploit DNS Servers

Attackers Use Recent BIND Flaw to Exploit DNS Servers

Week-old security flaw deployed in live attacks

Bind Vulnerability Closed in Ubuntu 15.04

Bind Vulnerability Closed in Ubuntu 15.04

This issue can be fixed by upgrading the OS

Bind Exploit Closed in Ubuntu 14.10

Bind Exploit Closed in Ubuntu 14.10

A couple of other distros have been affected as well

Bind Vulnerability Closed by Canonical in All Supported Ubuntu OSes

Bind Vulnerability Closed by Canonical in All Supported Ubuntu OSes

You will have to upgrade your system in order to fix the problem

Canonical Fixes Critical Bind Vulnerability in Ubuntu

Canonical Fixes Critical Bind Vulnerability in Ubuntu

Almost all supported Ubuntu operating systems were affected by this problem

Bind Vulnerability Fixed for Ubuntu 12.10 and Ubuntu 12.04 LTS

Bind Vulnerability Fixed for Ubuntu 12.10 and Ubuntu 12.04 LTS

To correct the problem users just have to update the system

Zero-Day Vulnerability Causes BIND 9 Server Crash

Zero-Day Vulnerability Causes BIND 9 Server Crash

Since there is no available workaround for the issue, users are advised to upgrade

DNS Servers Still in Danger

DNS Servers Still in Danger

A survey shows that one in four DNS servers are still vulnerable to various attacks

Patch for the Internet Core Flaw Is also Flawed

Patch for the Internet Core Flaw Is also Flawed

Proof-of-concept exploit for the patch was released

How to Host Your Own Domain with Bind9 on Ubuntu

How to Host Your Own Domain with Bind9 on Ubuntu

Set-up A DNS server to host your domain or provide a DNS server to your LAN.