ISC BIND 9 before 9.2.1 allows remote attackers to cause a denial of service (shutdown) via a malformed DNS packet that triggers an error condition that is not properly handled when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL, aka DoS_findtype.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation26 reference(s) from NVD