DescriptionBIND 4 (BIND4) and BIND 8 (BIND8), if used as a target forwarder, allows remote attackers to gain privileged access via a "Kashpureff-style DNS cache corruption" attack.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


[sarge] - bind <no-dsa> (Architectual limitatiom, upgrade to BIND 9 as a a fix)
BIND 8 is unsuitable for forwarder use because of its
architecture. Upgrade to BIND 9 as a fix.
This was fixed in sid by documenting it as an unfixable design limitation

Search for package or bug name: Reporting problems