ISC BIND 9 prior to 9.2.1 allows remote malicious users to cause a denial of service (shutdown) via a malformed DNS packet that triggers an error condition that is not properly handled when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL, aka DoS_findtype.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
isc bind 9.0 |
||
isc bind 9.1 |
||
isc bind 9.1.1 |
||
isc bind 9.1.3 |
||
isc bind 9.1.2 |
||
isc bind 9.2 |