Home / News

Largest Synchronized Internet Security Effort Underway to Patch Newly Found DNS Bug

A fundamental flaw in the design of the Domain Name System (DNS) was found earlier this year by security researcher Dan Kaminsky, renowned Internet Security expert. Researchers say they will fully describe the vulnerability in 30 days, after companies that operate web sites or Internet service providers can put the patches in place. The flaw is big enough that Kaminsky and other companies involved brought in government agencies such as the Department of Homeland Security and the U.S. Computer Emergency Response Team. Until the announcement today, experts had been quietly working on coordinating a massive patch affecting all types DNS implementation. Experts emphasized during the press conference today that the flaw is within the DNS protocol and in no way specific to any particular vendor.

• A related DNS checker tool is available on Kaminsky's website located on the top right hand corner.
• Vulnerability announcement from CERT: Multiple DNS implementations vulnerable to cache poisoning
• ISC Press Release on BIND: ISC acts quickly to shield BIND user base
• Related podcast interview with Dan Kaminsky
OpenDNS service recommended as a safe alternative DNS service to those of ISPs
DNSstuff Freeware Detects Vulnerable DNS Servers
Black Hat Webcast

Alliance forms to fix DNS poisoning flaw 7/8/2009 - SecurityFocus
Mulitple Vendors DNS Spoofing Vulnerability 7/8/2008 - Internet Storm Center
Related discussions on Slashdot 7/8/2008 - Slashdot
Major DNS flaw could disrupt the Internet 7/8/2008 - Network World
Kaminsky and Ptacek comment on DNS flaw 7/8/2008 - ZDNet
An Astonishing Collaboration 7/9/208 - CircleID
Internet Bug Fix Spawns Backlash From Hackers 7/9/2008 - PC World
Who's Really at Risk From the DNS Flaw? 7/10/2008 - InternetNews
DNS researcher convinces skeptics that bug is serious 7/11/2008 - ComputerWorld
The man who changed Internet security 7/14/2008 - CNet
Not a Guessing Game 7/14/2008 - CircleID
RHN Bind Update Brings Down RHEL Named 7/18/2008 - Slashdot
Has Halvar figured out super-secret DNS vulnerability? 7/21/2008 - ZDNet
Kaminsky's DNS Attack Disclosed, Then Pulled 7/21/2008 - Slashdot
DNS Security Flaw Secret Leaked Prior to Set Date: Patch DNS as Fast as Possible 7/21/2008 - CircleID
DNS Attack Code Has Been Published 7/23/2008 - CircleID
Kaminsky suggests long-term fix will still have to be determined 7/24/2008 - ZDNet
Day 30: Kaminsky DNS Bug Disclosure 8/6/2008 - CircleID

Read full story: External Source

By CircleID Reporter – CircleID's internal staff reporting on news tips and developing stories. Do you have information the professional Internet community should be aware of? Contact us. Visit Page

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

Co-designer of the TCP/IP Protocols & the Architecture of the Internet


Patch Tuesday By Larry Seltzer  –  Jul 08, 2008 1:16 pm PST

Is this the DNS bug that was patched today by Microsoft?

Yes according to reports By Ali Farshchian  –  Jul 08, 2008 1:43 pm PST

Larry, yes according this and probably other sources which I havn't had time to look into:

One of the Microsoft fixes for Windows DNS was part of a group of patches issued today by software vendors to plug a multi-platform hole. The researcher who uncovered the vulnerability called the group patch effort the "largest synchronized security update in the history of the Internet."

Yep By David A. Ulevitch  –  Jul 08, 2008 3:26 pm PST

Larry — Yes it was.

http://blog.opendns.com/ has some of our perspective. :-)

Partly DNS, but also nameserver randomization, correct? By Christopher Parente  –  Jul 09, 2008 1:27 pm PST

Quite the big news yesterday! Not everyone was vulnerable, as I bet the previous commenter points out via his URL.

Here's my attempt to describe the problem to a broader audience:

Add Your Comments

 To post your comments, please login or create an account.



Brand Protection

Sponsored byAppdetex

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byAfilias


Sponsored byThreat Intelligence Platform

IP Addressing

Sponsored byIPv4.Global

New TLDs

Sponsored byAfilias


Sponsored byWhoisXML API


Sponsored byVerisign