First published: Tue Jun 18 2002(Updated: )
ISC BIND 9 before 9.2.1 allows remote attackers to cause a denial of service (shutdown) via a malformed DNS packet that triggers an error condition that is not properly handled when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL, aka DoS_findtype.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISC BIND | =9.1.1 | |
ISC BIND | =9.1.3 | |
ISC BIND | =9.2 | |
ISC BIND | =9.1.2 | |
ISC BIND | =9.1 | |
ISC BIND | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.