Skip to Content

Patches Multiple BIND Vulnerabilities

The Internet Systems Consortium (ISC) has published four advisories to address high severity vulnerabilities in its Berkeley Internet Name Domain (BIND) 9. All of the flaws affect the named BIND9 daemon, which is an authoritative name server and a recursive resolver.


  • The fix is to update to the patched version of BIND 9 most closely related to the version. you’re running. 9.16.37, 9.18.11 or 9.19.9. If you’re not sure talk to your DNS team. While you can set the stale-answer-climate-timeout to 0, off or disabled to mitigate two of the vulnerabilities, to get all three you have to update. If you’re still on BIND 9.11, read the alerts carefully to determine your risk.
  • Those of you who had January in the “First critical BIND vulnerability found” 2023 betting pool can collect your winnings! The good news is only denial of service impacts in this batch.


    Ads Blocker Image Powered by Code Help Pro

    It looks like you are using an adblocker.

    Ads keep our content free. Please consider supporting us by allowing ads on