Software Holes Need Patching

    Date19 Feb 2001
    3376
    Posted ByAnthony Pell
    "We believe this issue is among the most serious the Internet will face," said Shawn Hernan, team leader for vulnerability handling at Carnegie Mellon University's Computer Emergency Response Team (CERT), which monitors problems on the Internet. . . . "We believe this issue is among the most serious the Internet will face," said Shawn Hernan, team leader for vulnerability handling at Carnegie Mellon University's Computer Emergency Response Team (CERT), which monitors problems on the Internet.

    The program is called the Berkeley Internet Name Domain. It's open source code that links a name, such as ComeToUs.com, to a numeric Internet Protocol address on a Domain Name System server, which directs users to the right place. With a few exceptions, Web sites have such a server in front of them running BIND and directing traffic. The DNS server is typically outside the corporate firewall with minimal protection and, thus, is a frequent target for hackers. Hernan said 80 percent to 90 percent of the copies of BIND in use contain one of a dozen known vulnerabilities.

    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    13
    radio
    [{"id":"55","title":"Yes","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"56","title":"No","votes":"0","type":"x","order":"2","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.