ISC has released security advisories addressing critical vulnerabilities in BIND 9 and Supported Preview Edition versions that could lead to memory exhaustion, undefined behavior, and heap use-after-free errors. These flaws are significant for tech professionals as they expose DNS infrastructure to service disruptions during GSS-API TKEY negotiations or query floods. Systems running affected versions should be updated immediately to mitigate risks associated with invalid class handling and DNS-over-HTTPS implementation weaknesses.
Read the full article at Malware Analysis, News and Indicators - Latest topics
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.





