FreeBSD Ports: bind9

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://www.uniras.gov.uk/niscc/docs/al-20050125-00060.html?lang=en http://www.isc.org/sw/bind/bind9.3.php#security http://www.vuxml.org/freebsd/30e4ed7b-1ca6-11da-bc01-000e0c2e438a.html
Insight
The following package is affected: bind9 CVE-2005-0034 An 'incorrect assumption' in the authvalidated validator function in BIND 9.3.0, when DNSSEC is enabled, allows remote attackers to cause a denial of service (named server exit) via crafted DNS packets that cause an internal consistency test (self-check) to fail.