By Chris Brook February 9, 2017
The Internet Systems Consortium patched the BIND domain name system this week, addressing a remotely exploitable vulnerability it considers high severity and said could lead to a crash.
The issue affects servers that use both the DNS64 and RPZ function simultaneously.
DNS64 is a mechanism for synthesizing AAAA records from A records. It’s traditionally used to allow IPv6-only clients to receive IPv6 addresses proxied to IPv4 addresses. The RPZ mechanism is used by Domain Name System recursive resolvers to allow for the customized handling of the resolution of collections of domain name information.
Powered by WPeMatico