This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Marek Vavrusa and Lubos Slovak report :
It is possible to crash (SIGSEGV) a NSD child server process by
sending it a non-standard DNS packet from any host on the internet. A
crashed child process will automatically be restarted by the parent
process, but an attacker may keep the NSD server occupied restarting
child processes by sending it a stream of such packets effectively
preventing the NSD server to serve.
See also :
Update the affected package.
Risk factor :
Medium / CVSS Base Score : 5.0