ISC BIND 9 before 9.2.1 allows remote attackers to cause a denial of service (shutdown) via a malformed DNS packet that triggers an error condition that is not properly handled when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL, aka DoS_findtype.
http://www.securityfocus.com/bid/4936
http://www.redhat.com/support/errata/RHSA-2003-154.html
http://www.redhat.com/support/errata/RHSA-2002-119.html
http://www.redhat.com/support/errata/RHSA-2002-105.html
http://www.novell.com/linux/security/advisories/2002_21_bind9.html
http://www.kb.cert.org/vuls/id/739123
http://www.iss.net/security_center/static/9250.php
http://www.isc.org/index.pl?/sw/bind/bind-security.php
http://www.cert.org/advisories/CA-2002-15.html
http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:038
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000494