Compaq Computer Corporation Information for VU#739123

ISC BIND 9 fails to process additional data chains in responses correctly thereby causing the server to fail an internal consistency check

Status

Not Affected

Vendor Statement

HP Alpha Server Products:

HP Tru64 UNIX:
Tru64 UNIX is not vulnerable to this reported problem. HP Tru64 UNIX ships with BIND 8.2.2-p5

TCP/IP for HP OpenVms:
TCP/IP for HP OpenVms is not vulnerable to this reported problem. The current versions of TCP/IP for HP OpenVMS ship BIND 8.2.2-p5


HP NonStop Server:
"HP NonStop Himalaya is not vulnerable to this problem. The 'named' function of Domain Name Server (T6021) which is implemented for HP NonStop Himalaya is based on BIND 4.8. NonStop DNS is the only Himalaya software product that includes 'named'."

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

None

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.