NLnet Labs has released a patch to address a vulnerability in NSD DNS versions 2.0.0 through 3.2.1. This vulnerability is due to an error in the way NSD processes certain types of packets that may lead to a buffer overflow. Exploitation of this vulnerability may allow a remote, unauthenticated attacker to cause the DNS software to crash, resulting in a denial-of-service condition.
US-CERT encourages users and administrators to review the NSD announcement regarding this vulnerability and apply any necessary updates or patches to help mitigate the risks.
Saturday, June 6, 2009
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment