August 5, 2015 By Douglas Bonderud 2 min read

What happens if a domain name system (DNS) goes down? Every service — from email to HTTP — is completely unavailable, rendering websites and servers useless. So it’s no surprise that malicious actors are always looking for ways to crash a DNS server. According to Computerworld, a newly discovered flaw in popular open-source DNS software BIND9 offers just this kind of opportunity. But what’s the vector, where’s the risk and is protection even possible?

What’s in a Name?

Without a DNS, the Internet would be a very different place. Instead of easily recognizable website names, only numbers would identify pages and companies, leaving average users with the task of manually entering each and every digit to ensure proper navigation. The use of authoritative and recursive DNS servers, however, makes it easy for companies to register the name of their choice and have it automatically converted into an IP address. Open-source BIND9 is the most popular domain name software in use, making it the ideal target for cybercriminals.

As noted by The Register, this newfound BIND bug (CVE-2015-5477) allows attackers to send a specific DNS request packet that triggers a REQUIRE assertion failure. The result? A BIND exit, causing DNS servers to crash and deny access to all hosted websites. Discovered by a security researcher, the bug is so severe that a single packet can bring down multiple servers — and according to Michael McNally, lead investigator for the Internet Systems Consortium, malicious actors “have successfully reverse engineered an attack kit from what has been divulged and from analyzing the code changes.”

Versions 9, 9.1.0 and 9.10.2-P2 of BIND include the vulnerability, which has been labeled a critical fix. Some experts argue the problem lies with BIND itself rather than the efforts of researchers and attackers, claiming that the open-source software has too many features, some of which are no longer utilized by DNS servers.

Preventing DNS Server Problems

Cybercriminals have been quick to jump on the BIND bandwagon. Sucuri CTO Daniel Cid said, “We can confirm that attacks have begun.” But security teams aren’t sitting around: There’s already a patch available from Amazon, Red Hat, CentOS and Ubuntu, but deploying the patch requires admins to apply the new code and restart their DNS server. McNally noted that there are no other workarounds except patching, and he advised that other protection methods such as firewalls won’t be of any use. If companies believe they’ve been hit, it’s possible to track down evidence in a server logs, which should show the “ANY TKEY” command so long as querylog is enabled.

The BIND9 flaw comes with real risk for any DNS server. And while a patch has already been made available, the simplicity of one-packet attacks coupled with long lead times when it comes to patching means this kind of attack could linger. Like Heartbleed and similar open source vulnerabilities, there’s a long tail here. Breaking free isn’t difficult with regular patching, but worry over bound DNS servers won’t disappear anytime soon.

More from

CISA hit by hackers, key systems taken offline

3 min read - The Cybersecurity and Infrastructure Security Agency (CISA) — responsible for cybersecurity and infrastructure protection across all levels of the United States government — has been hacked.“About a month ago, CISA identified activity indicating the exploitation of vulnerabilities in Ivanti products the agency uses,” a CISA spokesperson announced.In late February, CISA had already issued a warning that cyber threat actors are exploiting previously identified vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure gateways. Ivanti Connect Secure is a widely deployed…

Cloud security evolution: Years of progress and challenges

7 min read - Over a decade since its advent, cloud computing continues to enable organizational agility through scalability, efficiency and resilience. As clients shift from early experiments to strategic workloads, persistent security gaps demand urgent attention even as providers expand infrastructure safeguards.The prevalence of cloud-native services has grown exponentially over the past decade, with cloud providers consistently introducing a multitude of new services at an impressive pace. Now, the contemporary cloud environment is not only larger but also more diverse. Unfortunately, that size…

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today