By Eduard Kovacs on February 20, 2015
The Internet Systems Consortium (ISC) has released security updates to address a medium-severity vulnerability in BIND, the most widely used Domain Name System (DNS) software.
According to ISC, the BIND name server (named) process can crash under certain circumstances if it’s configured to perform DNSSEC validation and uses managed-keys. The vulnerability, caused by incorrectly handled trust anchor management (CVE-2015-1349), affects BIND versions 9.7.0 through 9.10.1-P1, and development releases 9.9.7rc1 and 9.10.2rc1.
Full Article
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.