djbdns Information for VU#739123
ISC BIND 9 fails to process additional data chains in responses correctly thereby causing the server to fail an internal consistency check
- Vendor Information Help Date Notified: 04 Jun 2002
- Statement Date:
- Date Updated: 11 Jun 2002
djbdns does not have this bug. Unlike BIND 9, djbdns does not commit hara-kiri when an attacker tries to confuse it, or pokes it sharply, or simply thinks bad thoughts in its general direction. djbdns has never used any BIND-derived code. See http://cr.yp.to/djbdns.html.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.