Please note that BIND 9.13 and BIND 9.15 are unstable development branches that are obsoleted. No security updates will be provided. Users should arrange upgrading the BIND to the latest supported versions or migrating to other supported technology.
BIND 9.0.0 to 9.11.21
BIND 9.9.3-S1 to 9.11.21-S1
BIND 9.11.3 to 9.11.21
BIND 9.12.0 to 9.16.5
BIND 9.17.0 to 9.17.3
Depending on the vulnerability exploited, a successful attack could lead to denial of service or elevation of privilege.
Internet Systems Consortium (ISC) has released the following patches to solve the problems:
Administrators of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.