Sun has reported that a remotely exploitable denial of service affects the Solaris 8 version of in.named, the primary DNS daemon. According to the report, a remote attacker can crash a running in.named process by sending it dynamic updates. Sun has stated that the remote attacker must be "privileged". Sun had made patches available. It is not known if this vulnerability is present in the ISC BIND source tree. If this were so, many other systems would be affected.
Sun has reported that a remotely exploitable denial of service affects the Solaris 8 version of in.named, the primary DNS daemon. According to the report, a remote attacker can crash a running in.named process by sending it dynamic updates. Sun has stated that the remote attacker must be "privileged". Sun had made patches available. It is not known if this vulnerability is present in the ISC BIND source tree. If this were so, many other systems would be affected.