named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Bind | Isc | 9.0.0 | * |
Bind | Isc | 9.10.0 | * |
Bind | Isc | 9.9.8 | 9.9.8 |
Bind | Isc | 9.9.8 | 9.9.8 |
Bind | Isc | 9.9.8 | 9.9.8 |
Bind | Isc | 9.9.8 | 9.9.8 |
Bind | Isc | 9.10.3 | 9.10.3 |
Bind | Isc | 9.10.3 | 9.10.3 |
Bind | Isc | 9.10.3 | 9.10.3 |
Bind | Isc | 9.10.3 | 9.10.3 |
Bind | Isc | 9.10.3 | 9.10.3 |
Bind | Isc | 9.10.3 | 9.10.3 |