bind: denial of service

ID ASA-201507-22
Type archlinux
Reporter Arch Linux
Modified 2015-07-29T00:00:00


A flaw was found in the way BIND handled requests for TKEY DNS resource records. A remote attacker could use this flaw to make named (functioning as an authoritative DNS server or a DNS resolver) exit unexpectedly with an assertion failure via a specially crafted DNS request packet leading to denial of service.