FS#2100 — FS#6075 — BIND 9 Remote Denial-of-Service
Attached to Project— Distributions/OS
Incident | |
All OS | |
CLOSED | |
![]() |
A fail on the server DNS Bind allows to cause remote the crash of the daemon.
This fail has been massively exploited on the Internet since the night of 16/11/11.
The security updates are available for different versions of BIND 9:
http://www.isc.org/software/bind/advisories/cve-2011-4313
Most of distributions released packages with the corrective.
The patch 2.32 Release 2 OVH fixes this flaw.
The servers after having subscribed to the Total Security are currently being updated.
The validation of the patch 1.87 Release 1 OVH is in progress by our team.
Date: Monday, 23 January 2012, 13:42PMThis fail has been massively exploited on the Internet since the night of 16/11/11.
The security updates are available for different versions of BIND 9:
http://www.isc.org/software/bind/advisories/cve-2011-4313
Most of distributions released packages with the corrective.
The patch 2.32 Release 2 OVH fixes this flaw.
The servers after having subscribed to the Total Security are currently being updated.
The validation of the patch 1.87 Release 1 OVH is in progress by our team.
Reason for closing: Done
Patch 1.87 is available for Release 1.