Multiple vulnerabilities were found in "EDNS", "managed-keys" and "Dynamically Loadable Zones" features of the Internet Systems Consortium (ISC) BIND software. A remote attacker could send specially crafted messages, make malicious queries or trigger DNS zone transfers to exploit the vulnerabilities.
Successful exploitation could lead to a denial of service condition or information disclosure on an affected system.
ISC has released the following patches to solve the problems:
http://www.isc.org/downloads/
Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://kb.isc.org/docs/cve-2018-5744
https://kb.isc.org/docs/cve-2018-5745
https://kb.isc.org/docs/cve-2019-6465
https://www.hkcert.org/my_url/en/alert/19022501
https://www.us-cert.gov/ncas/current-activity/2019/02/22/ISC-Releases-Security-Updates-BIND
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5744
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5745
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6465