[dns-operations] BIND Security Advisory May 2011: Large RRSIG RRsets and Negative Caching can crash named
    Stephane Bortzmeyer 
    bortzmeyer at nic.fr
       
    Fri May 27 07:33:26 UTC 2011
    
    
  
On Fri, May 27, 2011 at 12:26:54AM -0700,
 SM <sm at resistor.net> wrote 
 a message of 39 lines which said:
> http://test.federalreserve.gov also triggered the bug.
But no longer (federalreserve.gov is unsigned).
> As it is be possible to trigger this bug through the "web", it would
> be advisable to upgrade before people roll out the denial of
> service.
I don't know how the bug was handled but I did not see yet an announce
by a "vendor" about an updated package. So, currently, only the people
who installed BIND manually can upgrade.
    
    
More information about the dns-operations
mailing list