Skip to main content
ad info

 
CNN.com technology > computing
    Editions | myCNN | Video | Audio | Headline News Brief | Feedback  


MARKETS
4:30pm ET, 4/16
144.70
8257.60
3.71
1394.72
10.90
879.91
 












*
EDITIONS


Fix for DNS software hole released

graphic
InfoWorld

January 29, 2001
Web posted at: 1:02 p.m. EST (1802 GMT)

(IDG) -- A vulnerability recently discovered in the software used in most DNS (Domain Name System) servers may be the most serious security threat yet found on the Internet, allowing hackers effectively to shut down ISPs and corporate Web servers as well as steal confidential data.

The flaw in two widely used versions of BIND (Berkeley Internet Name Domain), distributed free by the Internet Software Consortium (ISC), could be exploited immediately by unscrupulous programmers if they can write a program to take advantage of it, said Jim Magdych, security research manager at the Computer Vulnerability Emergency Response Team (Covert) at PGP Security, a Network Associates business. Developing this might take only a few days, he said.

Covert and ISC, along with Carnegie-Mellon University's Computer Emergency Response Team (CERT) Coordination Center, will announce on Monday a fix for the vulnerability, and plan by that time to have the impact on the Internet at large," Magdych said.

IDG.net INFOCENTER
IDG.net
Related IDG.net Stories
Features
Visit an IDG site


IDG.net search



"If this just showed up in the wild, it could have a pretty serious fix available on ISC's Web page, www.isc.org. The flaw was discovered a few weeks ago, Magdych said in a telephone interview Sunday.

The vulnerability exists in versions 4 and 8 of BIND, the software used in "the vast majority" of DNS servers, though not in the recently released Version 9, Magdych said.

DNS servers translate the commands used to access Internet resources, such as Web URLs and e-mail addresses, into numbered IP addresses. The TSig (Transaction Signatures) vulnerability lets hackers take control of DNS servers and command them to redirect or block Internet requests sent to them.

A TSig attack could have effects similar to those of the denial-of-service attacks that kept users from reaching Microsoft Web sites last week, or even more serious effects, Magdych said. For example, hackers could take over a financial Web site, recreate the site's log-in screen, and direct user names and passwords to a server where they could be stolen.

Skilled hackers who break in to corporate DNS servers could block or redirect e-mail and even sabotage access to corporate databases over Internet-based company intranets.

"This is probably the most significant vulnerability to date in BIND," Magdych said. "It's really important that everyone who's affected by this either applies the patch or upgrades to BIND 9."

All hackers will need to do is write a program that sends certain messages as requests to DNS servers. The messages would be interpreted as commands that would open up the server to exploitation.

Although the vulnerability is a subtle one, there are hackers who could act on it quickly if made aware of it, Magdych said.

"When a new vulnerability is discovered, it's just a matter of time before someone develops a program to exploit that vulnerability. Those exploits are then distributed by the community of crackers," or unscrupulous hackers, Magdych said.

"It's certainly not going to be something that takes months. Among our adversaries there are some very talented individuals," he said.

Installing the patch to BIND versions 4 and 8 probably would require a few hours or more, depending on the number of DNS servers in the network, Magdych said. He advised that ISPs and corporations not jump the gun and shut their DNS servers down cold, unless an exploitation program is found in the wild, he added.

Although Web intrusions such as denial-of-service attacks so far have been more common in the United States, hacking activity in Asia is increasing, a computer security consultant in Hong Kong said.

The lower incidence of such attacks in the region doesn't guarantee the safety of any one company, said K.L. To, general manager of Skynet Consultants, in Hong Kong.

Smart IS managers "don't trust statistics," To said. Still, he added, IS managers who are serious about security still are in a minority in Hong Kong.

Once a hacker finds this type of vulnerability, it can become common knowledge "overnight," he said.

"Children with HK$38 [$4.87] in their pockets can go out to the bookstore and buy a hacker's guide with a print manual and a CD-ROM attached. ... It's that level of seriousness," To said.



RELATED STORIES:
DNS security upgrade promises a safer Net
October 17, 2000
Report: Half of smaller and midsize companies will suffer Internet attack
October 12, 2000
Senate committee approves watered-down anti-hacker bill
October 10, 2000
Online merchants brace for holiday credit card fraud
October 10, 2000
FBI's 'Carnivore' spurs new e-mail cloaking programs
September 26, 2000
Teen stock tout to pay $285,000 for 'pump and dump' scheme
September 21, 2000

RELATED IDG.net STORIES:
DNS software hole allows Web attacks
(IDG.net)
Understanding viruses
(SunWorld)
Microsoft to hire Akamai to guard against hackers
(InfoWorld.com)
Users slow to embrace security outsourcers
(InfoWorld.com)
Ramen Linux worm seen in wild
(IDG.net)
Beware: Not all e-signatures are equal
(CIO)
Could a cyberwar cripple the U.S.?
(Computerworld)
Hack my system. Please.
(The Industry Standard)

RELATED SITES:
Internet Software Consortium




Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.
 Search   

Back to the top