FreeBSD : dns/nsd -- DoS vulnerability from non-standard DNS packet (ce82bfeb-d276-11e1-92c6-14dae938ec40)
Medium Nessus Plugin ID 60089
The remote FreeBSD host is missing a security-related update.
Marek Vavrusa and Lubos Slovak report : It is possible to crash (SIGSEGV) a NSD child server process by sending it a non-standard DNS packet from any host on the internet. A crashed child process will automatically be restarted by the parent process, but an attacker may keep the NSD server occupied restarting child processes by sending it a stream of such packets effectively preventing the NSD server to serve.