Vulnerability: Buffer overflow in BIND4-derived resolver code

EnGarde Secure Linux, a secure distribution of Linux reports that there is a buffer overflow vulnerability in BIND4-derived resolver libraries which may be triggered by a malicious DNS server sending multiple CNAME records in a response. This may lead to arbitrary code execution or a denial of service attack.

EnGarde Community users are urged to upgrade to the most recent version.

Join the newsletter!

Error: Please check your email address.
Show Comments