Ubuntu Security Notice 5747-1 - It was discovered that Bind incorrectly handled large query name when using lightweight resolver protocol. A remote attacker could use this issue to consume resources, leading to a denial of service. It was discovered that Bind incorrectly handled large zone data size received via AXFR response. A remote authenticated attacker could use this issue to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS.
e0fa90d43b033818a5541fa0052dd3b5c0b63540bf52851fc17c004941501d36
Red Hat Security Advisory 2017-2533-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: It was found that the lightweight resolver protocol implementation in BIND could enter an infinite recursion and crash when asked to resolve a query name which, when combined with a search list entry, exceeds the maximum allowable length. A remote attacker could use this flaw to crash lwresd or named when using the "lwres" statement in named.conf.
f67e3196c2b632817bfb8e448d9d3dd646f5092db83ded905469f711f1af5d8f
HPE Security Bulletin HPSBUX03664 SSRT110248 1 - Potential security vulnerabilities have been identified in the HP-UX BIND service running named. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS). Revision 1 of this advisory.
8392ef8f305c64e4593fbb2199e3103ae32dcd3a29294e47dec33379b147a07a
Gentoo Linux Security Advisory 201610-7 - Multiple vulnerabilities have been found in BIND, the worst of which could cause a Denial of Service condition. Versions less than 9.10.4_p3 are affected.
e885855abe35efd826edd88bcb9587d9a78382fa97b73448ceaaa1f7c7a9f114
Debian Linux Security Advisory 3680-1 - Two vulnerabilities were reported in BIND, a DNS server.
81652422716b58bfe6ea4eccd254e3a93df6d4a155e0256d07bd4585d1d2f875
Slackware Security Advisory - New bind packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix a security issue.
c81fe238a093f581c2e3f1acbe9851b1639fab9e9c630bc83f68e883dc6980d8