NLnet Labs has released a patch to address a vulnerability in NSD DNS versions 2.0.0 through 3.2.1. This vulnerability is due to an error in the way NSD processes certain types of packets that may lead to a buffer overflow. Exploitation of this vulnerability may allow a remote, unauthenticated attacker to cause the DNS software to crash, resulting in a denial-of-service condition.

US-CERT…

Read more at: US-CERT Current Activity

NLnet Labs has released a patch to address a vulnerability in NSD DNS versions 2.0.0 through 3.2.1. This vulnerability is due to an error in the way NSD processes certain types of packets that may lead to a buffer overflow. Exploitation of this vulnerability may allow a remote, unauthenticated attacker to cause the DNS software to crash, resulting in a denial-of-service condition.

US-CERT encourages users and administrators to review the NSD announcement regarding this vulnerability and apply any necessary updates or patches to help mitigate the risks. Additional information regarding this vulnerability can be found in the Vulnerability Notes Database.

Read more at: US-CERT Current Activity