FreeBSD Ports: nsd

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html http://www.vuxml.org/freebsd/37a8603d-4494-11de-bea7-000c29a67389.html
Insight
The following packages are affected: nsd nsd2 CVE-2009-1755 Off-by-one error in the packet_read_query_section function in packet.c in nsd 3.2.1, and process_query_section in query.c in nsd 2.3.7, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors that trigger a buffer overflow.