The Internet Systems Consortium (ISC) has released a security advisory that addresses a vulnerability affecting multiple versions of ISC Berkeley Internet Name Domain (BIND). A remote attacker could exploit this vulnerability to obtain sensitive information.
Affected versions from BIND 9: 9.9.12, 9.9.12-S1, 9.10.7, 9.10.7-S1, 9.11.3, 9.11.3-S1, 9.11.3-S2, 9.12.0 through 9.12.1-P2, and the development release 9.13.0
The ISC proffer number of configuration workarounds which completely avoid the problem
CERT Bulgaria recommends users and administrators to review the ISC Knowledge Base Article AA-01616 and apply the necessary workarounds.