The flaw is in BIND versions 4 and 8 (but not version 9). ![]() If exploited via Transaction Signatures (TSig), the flaw could allow a cracker to perhaps shut down any site or, even worse, redirect calls to that site to the cracker’s site which could be set up to look like the real site and then steal information as users log in. A flaw was discovered in the widely-used Berkeley Internet Name Domain (BIND) software used to run many Domain Name System (DNS) servers. You can follow along at:īIND Vulnerability. ![]() ![]() I’ve also started a new personal site directed specifically toward a series of trips I plan to take to visit all of the California missions.
0 Comments
Leave a Reply. |