ISC Information for VU#327633

BIND 8.4.4 and 8.4.5 vulnerable to buffer overflow in q_usedns

Status

Affected

Vendor Statement

Workaround:

    Disable recursion and glue fetching.

Fix:
    Upgrade to BIND 8.4.6
    http://www.isc.org/sw/bind/

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Vendor References

    None

    Addendum

    US-CERT has no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.