Summary
The remote host is missing an update to pdns
announced via advisory DSA 1211-1.
It was discovered that malformed TCP packets may lead to denial of service and possibly the execution of arbitrary code if the PowerDNS nameserver acts as a recursive nameserver.
Solution
For the stable distribution (sarge) this problem has been fixed in version 2.9.17-13sarge3.
For the upcoming stable distribution (etch) this problem has been fixed in version 3.1.4-1 of pdns-recursor.
For the unstable distribution (sid) this problem has been fixed in version 3.1.4-1 of pdns-recursor.
We recommend that you upgrade your PowerDNS packages.
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201211-1
Severity
Classification
-
CVE CVE-2006-4251 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities