n/bind-9.7.3_P3-arm-1.tgz
A specially constructed packet will cause BIND 9 (“named”) to exit,
affecting
DNS service. The issue exists in BIND 9.6.3 and newer.
“Change #2912 (see CHANGES) exposed a latent bug in the
DNS message
processing code that could allow certain UPDATE requests to crash
named. This was fixed by disambiguating internal database
representation vs
DNS wire format data. [RT #24777] [CVE-2011-2464]”
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464
(* Security fix *)