Debian Security Advisory 1172-1 - Two vulnerabilities have been discovered in BIND9, the Berkeley Internet Name Domain server. The first relates to SIG query processing and the second relates to a condition that can trigger an INSIST failure, both lead to a denial of service.
090b12840939e0254abd0b47782491998d8539501ac74adfad6b37cbc8cf4a01
Mandriva Linux Security Advisory MDKSA-2006-163 - A vulnerability in BIND was discovered where it did not sufficiently verify particular requests and responses from other name servers and users. This could be exploited by sending a specially crafted packet to crash the name server.
ac56b8de826eac4634698b0a0ca8825de1a42bc11473a0cc2904b0196cc84770
Ubuntu Security Notice USN-343-1 - bind did not sufficiently verify particular requests and responses from other name servers and users. By sending a specially crafted packet, a remote attacker could exploit this to crash the name server.
7d6b3d264963798ae68d292be23f75876a241cf79c47d41eaf15dfd788dd7cff
FreeBSD Security Advisory - BIND 9 suffers from multiple denial of service vulnerabilities.
d4a8c901fd917c2e9269ec036040d861d50d033a2fcb23dda2d2938f8e43b448