HP Security Bulletin HPSBUX02451 SSRT090137 4 - A potential security vulnerability has been identified with HP-UX running BIND. The vulnerability could be exploited remotely to create a Denial of Service (DoS). Revision 4 of this advisory.
2974503ed85abbfb35af3cc0ad6fc4f63b6d035432f9ec878a658627f540f4e4
HP Security Bulletin - A potential security vulnerability has been identified with Tru64 UNIX running the BIND server. The vulnerability could be remotely exploited to create a Denial of Service (DoS).
5cc5bf3c0eceec30742ea2c7a159c9eec807fd00b573801ebcc1dafc7a661cb1
HP Security Bulletin - A potential security vulnerability has been identified with OpenVMS running HP TCP/IP Services BIND server. The vulnerability could be remotely exploited to create a Denial of Service (DoS).
44568bfa24c846d11ad5c01210754516d4154565fba5100419af14a74d4fcad3
HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running BIND. The vulnerability could be exploited remotely to create a Denial of Service (DoS).
0c17cc303eddc5f14d1296523433160a7dc7ca4466a8139afd29dccf71d36dd8
Gentoo Linux Security Advisory GLSA 200908-02 - Dynamic Update packets can cause a Denial of Service in the BIND daemon. Matthias Urlichs reported that the dns_db_findrdataset() function fails when the prerequisite section of the dynamic update message contains a record of type ANY and where at least one RRset for this FQDN exists on the server. Versions less than 9.4.3_p3 are affected.
34d3b5d8037c7af8019999cf307ff64664d626a8ab8da78482f5b5e914d4bbcd
ISC BIND 9 remote dynamic update message denial of service proof of concept exploit.
799163d3096ac6417859d8336c72804bd82e0fdfa3175c781142368b9092f046
Mandriva Linux Security Advisory 2009-181 - The dns_db_findrdataset function in db.c in named in ISC BIND 9.4 before 9.4.3-P3, 9.5 before 9.5.1-P3, and 9.6 before 9.6.1-P1, when configured as a master server, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an ANY record in the prerequisite section of a crafted dynamic update message, as exploited in the wild in July 2009. This update provides fixes for this vulnerability.
827d6e18872f55d13f65677eede4df6fe9b092aacbeeaf3a59f177de8bea2b66
Debian Security Advisory 1847-1 - It was discovered that the BIND DNS server terminates when processing a specially crafted dynamic DNS update. This vulnerability affects all BIND servers which serve at least one DNS zone authoritatively, as a master, even if dynamic updates are not enabled. The default Debian configuration for resolvers includes several authoritative zones, too, so resolvers are also affected by this issue unless these zones have been removed.
d960652c458b82724cffc42f08caf5a2da1661b518fb338a1238b9264835e4e6
Ubuntu Security Notice USN-808-1 - Micha Krause discovered that Bind did not correctly validate certain dynamic DNS update packets. An unauthenticated remote attacker could send specially crafted traffic to crash the DNS server, leading to a denial of service.
321adf8642de15d5ade0593a9fc17f483a670db20ed3b6b6722571deb78f5934
FreeBSD Security Advisory - When named(8) receives a specially crafted dynamic update message an internal assertion check is triggered which causes named(8) to exit. To trigger the problem, the dynamic update message must contains a record of type "ANY" and at least one resource record set (RRset) for this fully qualified domain name (FQDN) must exist on the server.
63f6e9c33b817f0e2995a59692b493e8ec93d0332cc4781442f1c4b5e3d35798