The remote host is missing an update to nsd announced via advisory FEDORA-2009-5191.
Apply the appropriate updates. This update can be installed with the yum update program. Use su -c 'yum update nsd' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/. https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5191
A one-byte overflow bug allows a carefully crafted exploit to bring down your DNS server. It is highly unlikely that this one byte overflow can lead to other (system) exploits. http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html ChangeLog: * Mon May 18 2009 Paul Wouters - 3.2.2-2 - Bump version * Mon May 18 2009 Paul Wouters - 3.2.2-1 - Upgraded to 3.2.2 security release http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html - Removed obsoleted options --enable-plugins --enable-mmap