{"id":166190,"date":"2024-07-26T11:07:21","date_gmt":"2024-07-26T11:07:21","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=166190"},"modified":"2024-07-26T11:07:24","modified_gmt":"2024-07-26T11:07:24","slug":"bind-updates-high-severity-dos-bugs","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/166190\/security\/bind-updates-high-severity-dos-bugs.html","title":{"rendered":"BIND updates fix four high-severity DoS bugs in the DNS software suite"},"content":{"rendered":"
<\/div>\n

The Internet Systems Consortium (ISC) released BIND security updates that fixed several remotely exploitable DoS bugs in the DNS software suite.<\/h2>\n\n\n\n

The Internet Systems Consortium (ISC) released security updates for BIND that address DoS vulnerabilities that could be remotely exploited. An attacker can exploit these vulnerabilities to disrupt DNS services.<\/gwmw><\/p>\n\n\n\n

ISC addressed four high-severity vulnerabilities (CVSS score of 7.5) tracked as CVE-2024-0760, CVE-2024-1737, CVE-2024-1975, and CVE-2024-4076.<\/p>\n\n\n\n

Below are the descriptions of the above issues included in the advisories<\/strong><\/a> released by the US cybersecurity agency CISA:<\/p>\n\n\n\n