It was discovered that Bind incorrectly handled IXFR transfers and dynamic
updates while under heavy load when used as an authoritative server. A
remote attacker could use this flaw to cause Bind to stop responding,
resulting in a denial of service.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 10.10 | noarch | libdns66 | < 1:9.7.1.dfsg.P2-2ubuntu0.2 | UNKNOWN |
Ubuntu | 10.10 | noarch | bind9 | < 1:9.7.1.dfsg.P2-2ubuntu0.2 | UNKNOWN |
Ubuntu | 10.10 | noarch | bind9-host | < 1:9.7.1.dfsg.P2-2ubuntu0.2 | UNKNOWN |
Ubuntu | 10.10 | noarch | bind9utils | < 1:9.7.1.dfsg.P2-2ubuntu0.2 | UNKNOWN |
Ubuntu | 10.10 | noarch | dnsutils | < 1:9.7.1.dfsg.P2-2ubuntu0.2 | UNKNOWN |
Ubuntu | 10.10 | noarch | libbind-dev | < 1:9.7.1.dfsg.P2-2ubuntu0.2 | UNKNOWN |
Ubuntu | 10.10 | noarch | libbind9-60 | < 1:9.7.1.dfsg.P2-2ubuntu0.2 | UNKNOWN |
Ubuntu | 10.10 | noarch | libisc60 | < 1:9.7.1.dfsg.P2-2ubuntu0.2 | UNKNOWN |
Ubuntu | 10.10 | noarch | libisccc60 | < 1:9.7.1.dfsg.P2-2ubuntu0.2 | UNKNOWN |
Ubuntu | 10.10 | noarch | libisccfg60 | < 1:9.7.1.dfsg.P2-2ubuntu0.2 | UNKNOWN |