It was discovered that malformed TCP packets may lead to denial of service and possibly the execution of arbitrary code if the PowerDNS nameserver acts as a recursive nameserver. For the stable distribution (sarge) this problem has been fixed in version 2.9.17-13sarge3. For the upcoming stable distribution (etch) this problem has been fixed in version 3.1.4-1 of pdns-recursor. For the unstable distribution (sid) this problem has been fixed in version 3.1.4-1 of pdns-recursor. We recommend that you upgrade your PowerDNS packages.
It was discovered that malformed TCP packets may lead to denial of service and possibly the execution of arbitrary code if the PowerDNS nameserver acts as a recursive nameserver.
For the stable distribution (sarge) this problem has been fixed in version 2.9.17-13sarge3.
For the upcoming stable distribution (etch) this problem has been fixed in version 3.1.4-1 of pdns-recursor.
For the unstable distribution (sid) this problem has been fixed in version 3.1.4-1 of pdns-recursor.
We recommend that you upgrade your PowerDNS packages.
MD5 checksums of the listed files are available in the original advisory.