Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns before 1.6.11 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Resource Record (RR) with an unknown type containing input that is longer than a specified length.
http://www.securityfocus.com/bid/49748
http://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=403
http://secunia.com/advisories/46476
http://secunia.com/advisories/46470
http://seclists.org/oss-sec/2011/q3/542
http://seclists.org/oss-sec/2011/q3/503
http://nlnetlabs.nl/svn/ldns/tags/release-1.6.11/Changelog
http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00008.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068239.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068201.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068091.html