The remote DNS server may be affected by a Denial of Service (DoS) attack vector.
Versions of ISC BIND 9.x prior to 9.9.8-P3, 9.9.8-S4, 9.9.9-S3 and 9.10.3-P3 are unpatched for a flaw in the 'totext_in_apl()' function in 'lib/dns/rdata/in_1/apl_42.c' that is triggered when handling certain string formatting operations. This may allow an authenticated, remote attacker to cause the named service to terminate.
Upgrade ISC BIND to version 9.10.3-P3 or later. If version 9.10.x cannot be obtained, versions 9.9.9-S3, 9.9.8-S4 and 9.9.8-P3 are also patched for this vulnerability.