A denial of service flaw was found in the way BIND processed certain malformed Address Prefix List (APL) records. A remote, authenticated attacker could use this flaw to cause named to crash.
The following flaw in BIND was reported by ISC:
A buffer size check used to guard against overflow could cause named to exit with an INSIST failure In apl_42.c.
A server could exit due to an INSIST failure in apl_42.c when performing certain string formatting operations. Examples include (but may not be limited to):
Slaves using text-format db files could be vulnerable if receiving a malformed record in a zone transfer from their master.
Masters using text-format db files could be vulnerable if they accept a malformed record in a DDNS update message.
Recursive resolvers are potentially vulnerable when debug logging, if they are fed a deliberately malformed record by a malicious server.
A server which has cached a specially constructed record could encounter this condition while performing 'rndc dumpdb'.
This issue has been addressed in the following products:
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 5
Via RHSA-2016:0073 https://rhn.redhat.com/errata/RHSA-2016-0073.html