ISC BIND 9 before 9.2.1 allows remote attackers to cause a denial of service (shutdown) via a malformed DNS packet that triggers an error condition that is not properly handled when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL, aka DoS_findtype.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Bind | Isc | 9.0 (including) | 9.0 (including) |
| Bind | Isc | 9.1 (including) | 9.1 (including) |
| Bind | Isc | 9.1.1 (including) | 9.1.1 (including) |
| Bind | Isc | 9.1.2 (including) | 9.1.2 (including) |
| Bind | Isc | 9.1.3 (including) | 9.1.3 (including) |
| Bind | Isc | 9.2 (including) | 9.2 (including) |
| Red Hat Enterprise Linux AS (Advanced Server) version 2.1 | RedHat | * | |
| Red Hat Linux 7.1 | RedHat | * | |
| Red Hat Linux 7.1 | RedHat | * | |
| Red Hat Linux 7.2 | RedHat | * | |
| Red Hat Linux 7.3 | RedHat | * |