Internet Systems Consortium issues a patch for an actively exploited denial-of-service vulnerability in the widely used BIND DNS server. The crashes are the result of an inconsistent record being cached and then served to clients. It’s not yet clear what kind of network event causes the BIND resolvers to cache the malformed record in the first place. The vulnerability expert says there are no reasons to believe that the vulnerability could also have code execution potential, which would make it much more dangerous. System and network administrators are strongly encouraged to upgrade their BIND installations to the newly released 9.8.1-P1, 9.7.4-P”]

