An "incorrect assumption" in the authvalidated validator function in BIND 9.3.0, when DNSSEC is enabled, allows remote attackers to cause a denial of service (named server exit) via crafted DNS packets that cause an internal consistency test (self-check) to fail.
Link | Tags |
---|---|
http://www.trustix.org/errata/2005/0003/ | vendor advisory |
http://www.securityfocus.com/bid/12365 | vdb entry |
http://www.isc.org/index.pl?/sw/bind/bind9.php | |
http://www.uniras.gov.uk/niscc/docs/al-20050125-00060.html | patch |
http://secunia.com/advisories/14008 | third party advisory |
http://www.isc.org/index.pl?/sw/bind/bind-security.php | patch |
http://www.kb.cert.org/vuls/id/938617 | us government resource third party advisory patch |
http://securitytracker.com/id?1012995 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19062 | vdb entry |