Gentoo Linux Security Advisory 201610-7 - Multiple vulnerabilities have been found in BIND, the worst of which could cause a Denial of Service condition. Versions less than 9.10.4_p3 are affected.
e885855abe35efd826edd88bcb9587d9a78382fa97b73448ceaaa1f7c7a9f114
HPE Security Bulletin HPSBUX03552 SSRT102983 1 - A potential security vulnerability has been identified in the HP-UX BIND service running named. This vulnerability could be exploited remotely to create a Denial of Service (DoS). Revision 1 of this advisory.
7cabe3343bf21619013021f50133dc63be6a2b2667215bea42b7afa0d0a56847
Slackware Security Advisory - New bind packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix security issues.
42e86b23c5c42c1c2293aece44ea736ce80e7fbbf55df298c230be1f1a6bc079
Red Hat Security Advisory 2016-0074-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND processed certain malformed Address Prefix List records. A remote, authenticated attacker could use this flaw to cause named to crash.
03f7bbfa2b18a4a3b83bbffd6ed34a4d48ec454bf9244aad45716be05882f8d3
Red Hat Security Advisory 2016-0073-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND processed certain malformed Address Prefix List records. A remote, authenticated attacker could use this flaw to cause named to crash.
0db5e96fc5a1c32ba00ccd1a8a3d18015f269e554da1d8b34e329b5755e2b83b
FreeBSD Security Advisory - There is an off-by-one error in a buffer size check when performing certain string formatting operations. Slaves using text-format db files could be vulnerable if receiving a malformed record in a zone transfer from their master. Masters using text-format db files could be vulnerable if they accept a malformed record in a DDNS update message. Recursive resolvers are potentially vulnerable when debug logging is enabled and if they are fed a deliberately malformed record by a malicious server. A server which has cached a specially constructed record could encounter this condition while performing 'rndc dumpdb'.
c803a5067169b0dd06a8b595f07a796ef604d725b2cec7e9041f63d8bdb30a0a
Debian Linux Security Advisory 3449-1 - It was discovered that specific APL RR data could trigger an INSIST failure in apl_42.c and cause the BIND DNS server to exit, leading to a denial-of-service.
9c5126f6a38834936685b484189802425c16dcb30a0def35a457930995235275
Ubuntu Security Notice 2874-1 - It was discovered that Bind incorrectly handled certain APL data. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service.
79c2264aa4bbf6599a9769e264c77651900d8554ab8ef78a9f3d91d35415cd61