Debian Security Advisory DSA 2448-1 (inspircd)

Summary
The remote host is missing an update to inspircd announced via advisory DSA 2448-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202448-1
Insight
It was discovered that a heap-based buffer overflow in InspIRCd could allow remote attackers to execute arbitrary code via a crafted DNS query. For the stable distribution (squeeze), this problem has been fixed in version 1.1.22+dfsg-4+squeeze1. For the testing distribution (wheezy), this problem has been fixed in version 1.1.22+dfsg-4+wheezy1. For the unstable distribution (sid), this problem has been fixed in version 2.0.5-0.1. We recommend that you upgrade your inspircd packages.