New Year, New BIND Security Vulnerabilities.

[vc_row][vc_column width=”2/3″][vc_column_text]We are barely into the new year, and BIND users have more patching to do.

Today, the Internet Software Consortium (ISC) announced the availability of patches to fix two critical BIND security vulnerabilities:



Both of these vulnerabilities can be remotely exploited and can cause BIND to crash. BIND users and users of BIND-based appliances like Infoblox, Bluecat Networks, F5, EfficientIP and others should check their version of BIND to see if it needs to be patched.

Secure64 DNS products including DNS Cache, DNS Authority and DNS Signer do not use any BIND code and  therefore do not share these vulnerabilities.[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_single_image image=”2526″ img_size=”500X600″][/vc_column][/vc_row]