Bind security issues

This time the security issue is with BIND 9 specifically and not DNS in general as Dan Kaminsky’s fabled cache poisoning issue from last year. Receipt of a specially-crafted dynamic update message to a zone for which the server is the master may cause BIND 9 servers to exit. Slaves are unaffected however. Patches are available for the 9.4, 9.5 and 9.6 streams of BIND.

DynDNS have been quick off the mark and updated their DNS services as of last night ( 29.7.1009 ) but they will probably be in the minority as these things tend to take time to filter through to all those managing DNS throughout the Internet. More info here