The Internet Systems Consortium has released updates for BIND DNS software to address high-severity vulnerabilities that can be exploited through specially crafted domain names. The flaws allow attackers to trigger out-of-memory conditions in BIND resolvers, resulting in memory leaks that could impact DNS service availability.
The vulnerabilities are classified as high-severity, indicating significant potential impact on affected systems. BIND is one of the most widely deployed DNS server software packages, making these vulnerabilities particularly concerning for internet infrastructure.