The Internet Systems Consortium (ISC) has released critical security advisories addressing multiple vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 software, a cornerstone of the Domain Name System (DNS) infrastructure.
These vulnerabilities, identified as CVE-2024-0760, CVE-2024-1737, CVE-2024-1975, and CVE-2024-4076, could allow attackers to destabilize DNS servers, leading to denial-of-service (DoS) conditions.
The most alarming of these vulnerabilities, CVE-2024-0760, involves a scenario where a malicious client can flood the server with DNS messages over TCP, potentially rendering the server unstable during the attack.
This particular exploit poses a significant threat as it can be executed remotely, making it easier for attackers to disrupt services without direct access to the server.
Another critical vulnerability, CVE-2024-1975, allows attackers to exhaust CPU resources using SIG(0) messages, which could slow down or crash the server. CVE-2024-1737 affects the server’s database performance when many resource records (RRs) exist simultaneously, causing significant delays.
Join our free webinar to learn about combating slow DDoS attacks, a major threat today.
Lastly, CVE-2024-4076 can trigger assertion failures when the server handles stale cache data and authoritative zone content simultaneously, leading to potential system crashes.
These vulnerabilities have raised alarms across various sectors, including financial institutions, government agencies, and internet service providers (ISPs), all of which rely heavily on BIND for DNS resolution. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urged users and administrators to apply the necessary updates immediately to mitigate these risks.
BIND 9, known for being the first and most widely deployed DNS solution, has a long history of being targeted due to its critical role in internet infrastructure. Previous high-profile attacks, such as the 2016 distributed denial-of-service (DDoS) attack on Dyn’s servers, have highlighted the potential for widespread disruption when DNS services are compromised.
The ISC has released patches to address these vulnerabilities, and users are strongly encouraged to upgrade to the latest versions to protect their systems. The affected versions include 9.16.0 to 9.16.36, 9.18.0 to 9.18.10, and 9.19.0 to 9.19.8. The updates are crucial to maintaining the stability and security of DNS operations.
As the internet continues evolving, ensuring foundational technologies like DNS security remains paramount.
Before initiating the update process, it is essential to assess the potential impact on your business operations. Consider the following:
Ensure that you have a complete backup of your current BIND configuration and any relevant data. This step is crucial to restore services quickly if something goes wrong during the update process.
Visit the ISC website or your package manager to download the latest patches for BIND. The affected versions include:
Follow these steps to apply the updates:
sudo apt-get update sudo apt-get install bind9
ortextsudo yum update bind
wget https://downloads.isc.org/isc/bind9/9.x.x/bind-9.x.x.tar.gz tar -zxvf bind-9.x.x.tar.gz cd bind-9.x.x ./configure make sudo make install
After applying the updates, verify that the BIND server is running the latest version:
textnamed -v
Ensure that the version number matches the latest patched version.
Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo
Conor Brian Fitzpatrick, the 22-year-old former administrator of cybercrime marketplace BreachForums, will forfeit nearly $700,000…
In the ever-evolving cybersecurity landscape, fileless malware has emerged as one of the most dangerous…
Advanced Persistent Threats (APTs) represent one of the most formidable challenges facing enterprises today, emphasizing…
CISA to remove standard cybersecurity alerts and advisories from its website. On May 12, 2025, CISA…
Significant vulnerabilities uncovered in Volkswagen's connected car app that exposed sensitive personal information and complete…
Security researchers successfully exploited multiple zero-day vulnerabilities in Windows 11, VMware ESXi, and Mozilla Firefox…