Cyber Security News

BIND DNS Vulnerability Lets Attackers Flood Server With DNS Messages

The Internet Systems Consortium (ISC) has released critical security advisories addressing multiple vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 software, a cornerstone of the Domain Name System (DNS) infrastructure.

These vulnerabilities, identified as CVE-2024-0760, CVE-2024-1737, CVE-2024-1975, and CVE-2024-4076, could allow attackers to destabilize DNS servers, leading to denial-of-service (DoS) conditions.

The most alarming of these vulnerabilities, CVE-2024-0760, involves a scenario where a malicious client can flood the server with DNS messages over TCP, potentially rendering the server unstable during the attack.

This particular exploit poses a significant threat as it can be executed remotely, making it easier for attackers to disrupt services without direct access to the server.

Another critical vulnerability, CVE-2024-1975, allows attackers to exhaust CPU resources using SIG(0) messages, which could slow down or crash the server. CVE-2024-1737 affects the server’s database performance when many resource records (RRs) exist simultaneously, causing significant delays.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

Lastly, CVE-2024-4076 can trigger assertion failures when the server handles stale cache data and authoritative zone content simultaneously, leading to potential system crashes.

These vulnerabilities have raised alarms across various sectors, including financial institutions, government agencies, and internet service providers (ISPs), all of which rely heavily on BIND for DNS resolution. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urged users and administrators to apply the necessary updates immediately to mitigate these risks.

BIND 9, known for being the first and most widely deployed DNS solution, has a long history of being targeted due to its critical role in internet infrastructure. Previous high-profile attacks, such as the 2016 distributed denial-of-service (DDoS) attack on Dyn’s servers, have highlighted the potential for widespread disruption when DNS services are compromised.

The ISC has released patches to address these vulnerabilities, and users are strongly encouraged to upgrade to the latest versions to protect their systems. The affected versions include 9.16.0 to 9.16.36, 9.18.0 to 9.18.10, and 9.19.0 to 9.19.8. The updates are crucial to maintaining the stability and security of DNS operations.

As the internet continues evolving, ensuring foundational technologies like DNS security remains paramount.

How to Apply the Necessary Updates

1. Assess the Impact

Before initiating the update process, it is essential to assess the potential impact on your business operations. Consider the following:

  • Identify all systems running affected versions of BIND.
  • Evaluate the criticality of the systems and the potential downtime required for updates.
  • Communicate with stakeholders about the planned update and its potential impact.

2. Backup Configuration and Data

Ensure that you have a complete backup of your current BIND configuration and any relevant data. This step is crucial to restore services quickly if something goes wrong during the update process.

3. Download the Latest Patches

Visit the ISC website or your package manager to download the latest patches for BIND. The affected versions include:

  • 9.16.0 to 9.16.36
  • 9.18.0 to 9.18.10
  • 9.19.0 to 9.19.8

4. Apply the Updates

Follow these steps to apply the updates:

  • For Linux-based systems:textsudo apt-get update sudo apt-get install bind9 ortextsudo yum update bind
  • For source installations:textwget https://downloads.isc.org/isc/bind9/9.x.x/bind-9.x.x.tar.gz tar -zxvf bind-9.x.x.tar.gz cd bind-9.x.x ./configure make sudo make install

5. Verify the Update

After applying the updates, verify that the BIND server is running the latest version:

textnamed -v

Ensure that the version number matches the latest patched version.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

BreachForums Admin to Pay $700,000 in Health Care Data Breach

Conor Brian Fitzpatrick, the 22-year-old former administrator of cybercrime marketplace BreachForums, will forfeit nearly $700,000…

10 minutes ago

Fileless Malware – How to Detect and Prevent Attacks

In the ever-evolving cybersecurity landscape, fileless malware has emerged as one of the most dangerous…

11 minutes ago

Understanding APTs – Detection and Response for Enterprises

Advanced Persistent Threats (APTs) represent one of the most formidable challenges facing enterprises today, emphasizing…

45 minutes ago

CISA to Discontinue Cybersecurity Alerts & Advisories on Official Webpages

CISA to remove standard cybersecurity alerts and advisories from its website. On May 12, 2025, CISA…

49 minutes ago

Volkswagen Car Hacked – Owner’s Personal Data & Service Details Exposed

Significant vulnerabilities uncovered in Volkswagen's connected car app that exposed sensitive personal information and complete…

2 hours ago

Windows 11, VMware ESXi & Firefox 0-day Vulnerabilities Exploited – Pwn2Own Day 3

Security researchers successfully exploited multiple zero-day vulnerabilities in Windows 11, VMware ESXi, and Mozilla Firefox…

2 hours ago