An "incorrect assumption" in the authvalidated validator function in BIND 9.3.0, when DNSSEC is enabled, allows remote attackers to cause a denial of service (named server exit) via crafted DNS packets that cause an internal consistency test (self-check) to fail.
https://exchange.xforce.ibmcloud.com/vulnerabilities/19062
http://www.uniras.gov.uk/niscc/docs/al-20050125-00060.html
http://www.trustix.org/errata/2005/0003/
http://www.securityfocus.com/bid/12365
http://www.kb.cert.org/vuls/id/938617
http://www.isc.org/index.pl?/sw/bind/bind9.php
http://www.isc.org/index.pl?/sw/bind/bind-security.php