Off-by-one error in the packet_read_query_section function in packet.c in nsd 3.2.1, and process_query_section in query.c in nsd 2.3.7, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors that trigger a buffer overflow.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html | patch vendor advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529420 | patch |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529418 | patch |
http://www.openwall.com/lists/oss-security/2009/05/19/1 | mailing list |