Summary
The remote host is missing an update to nsd
announced via advisory FEDORA-2009-5191.
Solution
Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update nsd' at the command line.
For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5191
Insight
A one-byte overflow bug allows a carefully crafted exploit to bring down your DNS server. It is highly unlikely that this one byte overflow can lead to other (system) exploits.
http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html
ChangeLog:
* Mon May 18 2009 Paul Wouters - 3.2.2-2
- Bump version
* Mon May 18 2009 Paul Wouters - 3.2.2-1
- Upgraded to 3.2.2 security release
http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html - Removed obsoleted options --enable-plugins --enable-mmap