ISC BIND 9 before 9.2.1 allows remote attackers to cause a denial of service (shutdown) via a malformed DNS packet that triggers an error condition that is not properly handled when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL, aka DoS_findtype.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Bind | Isc | 9.0 (including) | 9.0 (including) |
Bind | Isc | 9.1 (including) | 9.1 (including) |
Bind | Isc | 9.1.1 (including) | 9.1.1 (including) |
Bind | Isc | 9.1.2 (including) | 9.1.2 (including) |
Bind | Isc | 9.1.3 (including) | 9.1.3 (including) |
Bind | Isc | 9.2 (including) | 9.2 (including) |
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 | RedHat | * | |
Red Hat Linux 7.1 | RedHat | * | |
Red Hat Linux 7.1 | RedHat | * | |
Red Hat Linux 7.2 | RedHat | * | |
Red Hat Linux 7.3 | RedHat | * |