Buffer overflow in named in BIND 4 versions 4.9.10 and earlier, and 8 versions 8.3.3 and earlier, allows remote malicious users to execute arbitrary code via a certain DNS server response containing SIG resource records (RR).
[Bind version 9, the bind9 package, is not affected by these problems]
ISS X-Force has discovered several serious vulnerabilities in the Berkeley
Internet Name Domain Server (BIND) BIND is the most common implementation
of the DNS (Domain Name Service) protocol, which is used on the vast
majority of DNS servers on the Internet DNS is a vital Int ...