BIND bug opens domain name servers to attack
CERT, an Internet security advisory service, on Tuesday warned that the flaw affects Domain Name System (DNS) servers running version 9 of Berkeley Internet Name Domain (BIND) prior to version 9.2.1. Version 9.2.1 is BIND's current release. "Because the normal operation of most services on the Internet depends on the proper operation of DNS servers, other services could be affected if this vulnerability is exploited," wrote CERT's Ian Finlay in a statement.
The link for this article located at ZDNet UK is no longer available.