An attacker can exploit this issue to cause the 'named' process to crash, denying service to legitimate users. This issue may also be exploited to disclose certain memory information to clients.
Vendor Status:
ISC had issued an update for this vulnerability