Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CYBER ALERT
Home / CYBER ALERT
/
Updates for ISC BIND (AL01/250130/CSIRT-ITA)

Updates for ISC BIND (AL01/250130/CSIRT-ITA)

Summary

ISC security updates address 2 vulnerabilities with severity “high”, in the BIND product. These vulnerabilities, if exploited, could lead to compromised service availability.

Risk

Vulnerability impact estimate on the target community: Medium (63.46)

Type

  • Denial of Service

Affected products and versions

BIND

  • from version 9.11.0 to 9.11.37
  • from version 9.16.0 to 9.16.50
  • from version 9.18.0 to 9.18.32
  • from version 9.20.0 to 9.20.4
  • from version 9.21.0 to 9.21.3

BIND Supported Preview Edition

  • from version 9.11.3-S1 to 9.11.37-S1
  • from version 9.16.8-S1 to 9.16.50-S1
  • from version 9.18.11-S1 to 9.18.32-S1

Action mitigation

In line with vendor statements, it is recommended to update vulnerable products following the guidance in the security bulletins reported in the References section.

CVE
CVE-2024-11187
CVE-2024-12705

References

https://kb.isc.org/docs/cve-2024-11187

https://kb.isc.org/docs/cve-2024-12705

1This estimate is made taking into account several parameters, including: CVSS, availability of patches/workarounds and PoC, diffusion of the affected software/devices in the reference community.

Recommended to you

Search in 365TRUST

Our services