An “incorrect assumption” in the authvalidated validator function in BIND 9.3.0, when DNSSEC is enabled, allows remote attackers to cause a denial of service (named server exit) via crafted DNS packets that cause an internal consistency test (self-check) to fail.
secunia.com/advisories/14008
securitytracker.com/id?1012995
www.isc.org/index.pl?/sw/bind/bind-security.php
www.isc.org/index.pl?/sw/bind/bind9.php
www.kb.cert.org/vuls/id/938617
www.securityfocus.com/bid/12365
www.trustix.org/errata/2005/0003/
www.uniras.gov.uk/niscc/docs/al-20050125-00060.html
exchange.xforce.ibmcloud.com/vulnerabilities/19062