ISC BIND 9 before 9.2.1 allows remote attackers to cause a denial of service (shutdown) via a malformed DNS packet that triggers an error condition that is not properly handled when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL, aka DoS_findtype.
ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.24.1/CSSA-2002-SCO.24.1.txt
archives.neohapsis.com/archives/hp/2002-q3/0022.html
distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000494
frontal2.mandriva.com/security/advisories?name=MDKSA-2002:038
www.cert.org/advisories/CA-2002-15.html
www.isc.org/index.pl?/sw/bind/bind-security.php
www.iss.net/security_center/static/9250.php
www.kb.cert.org/vuls/id/739123
www.novell.com/linux/security/advisories/2002_21_bind9.html
www.redhat.com/support/errata/RHSA-2002-105.html
www.redhat.com/support/errata/RHSA-2002-119.html
www.redhat.com/support/errata/RHSA-2003-154.html
www.securityfocus.com/bid/4936