Common Vulnerabilities and Exposures assigned an identifier CVE-2010-3762 to the following vulnerability: ISC BIND before 9.7.2-P2, when DNSSEC validation is enabled, does not properly handle certain bad signatures if multiple trust anchors exist for a single zone, which allows remote attackers to cause a denial of service (daemon crash) via a DNS query. References: [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3762 [2] http://ftp.isc.org/isc/bind9/9.7.2-P2/RELEASE-NOTES-BIND-9.7.2-P2.html
This issue did NOT affect the versions of the bind package, as shipped with Red Hat Enterprise Linux 3 and 4, as those versions implement the Domain Name System Security Extensions (DNSSEC) in different way. This issue affects the version of the bind package, as shipped with Red Hat Enterprise Linux 5. -- This issue does NOT affect the versions of the bind package, as shipped with Fedora release of 12 and 13 (as relevant bind packages are already updated).
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2010:0976 https://rhn.redhat.com/errata/RHSA-2010-0976.html
This issue did NOT affect the version of the bind97 package, as shipped with Red Hat Enterprise Linux 5 (the problem has been corrected yet before the initial bind97 package for Red Hat Enterprise Linux 5 has been released).