NSD packet.c Off-By-One Remote Overflow

medium Nessus Plugin ID 38850


The DNS server running on the remote host has a remote buffer overflow vulnerability.


According to its self-reported version number, the version of NSD running on the remote host has a stack-based buffer overflow vulnerability. This could allow a remote attacker to overwrite one byte in memory, leading to a denial of service. It is possible, but unlikely, that this vulnerability could result in remote code execution.


Upgrade to NSD version 3.2.2 or later, or apply the patch referenced in the vendor's advisory.

See Also


Plugin Details

Severity: Medium

ID: 38850

File Name: nsd_packet_overflow.nasl

Version: Revision: 1.11

Type: remote

Family: DNS

Published: 5/21/2009

Updated: 5/11/2016

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport, nsd/version

Exploit Ease: No known exploits are available

Reference Information

BID: 35029

Secunia: 35165