An one-byte buffer overflow was found in NSD, a complete implementation of an authoritative DNS name server, in one of its low-level DNS packet decoding routines. An attacker could provide a specially-crafted DNS record to the NSD DNS name server, leading to a denial of service. Credit: Ilja van Sprundel of IOActive References: http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529420 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529418 http://www.openwall.com/lists/oss-security/2009/05/19/1 http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.2.tar.gz http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.1-vuln.patch http://www.nlnetlabs.nl/downloads/nsd/nsd-2.3.7-vuln.patch
The issue was addressed in nsd-3.2.2-1.fc9 version of NSD package, for Fedora 9. The issue was addressed in nsd-3.2.2-2.fc10 version of NSD package, for Fedora 10. The issue was addressed in nsd-3.2.2-2.fc11 version of NSD package, for Fedora 11.
CVE-2009-1755: Off-by-one error in packet.c in nsd 3.2.1 and 2.3.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors that trigger a buffer overflow.