The Register: “A buffer overflow vulnerability in DNS Resolver Library represents a serious risk to many Unix system using the BIND or BSD resolver libraries, CERT warned last week. It warned that a remote attacker who is able to send malicious DNS responses could potentially exploit this vulnerability to execute arbitrary code or cause a denial of service on a vulnerable systems.” Check out the rest of this advisory here.
Category:
- Security