Greenwood Village, CO July 24, 2013 – Secure64 announced today that its family of DNS products are unaffected by the critical security vulnerability, CVE-2013-4854, reported against the widely deployed BIND DNS software. The vulnerability allows remote attackers to crash vulnerable BIND servers with a specially crafted query. Secure64’s DNS Cache, Authority and Signer products are all unaffected by this BIND-specific vulnerability, as they share no code in common with BIND.
“All software has flaws, but BIND has become the target of choice for DNS attacks because of its ubiquity,” said Steve Goodbarn, CEO of Secure64. “Organizations that rely on just one variant of the DNS risk losing their entire internet presence if there is an attack on that variant. By deploying multiple DNS solution variants, organizations can ensure business continuity even if there is a successful attack on one of them. We call this strategy ‘Genetic Diversity’ because it does for the DNS what DNA diversity does in nature – increase the odds of survival.”