A flaw in the widely used BIND DNS (Domain Name System) software can be exploited by remote attackers. The flaw stems from the way regular expressions are processed by the libdns library that’s part of the BIND software distribution. BIND is by far the most widely used DNS server software on the Internet. The Internet Systems Consortium (ISC)2 rates the vulnerability as critical. There are no known active exploits at the moment, but that might soon change, the ISC says.”]