Vulnerability: Buffer overflow in BIND4-derived resolver code

EnGarde Secure Linux, a secure distribution of Linux reports that there is a buffer overflow vulnerability in BIND4-derived resolver libraries which may be triggered by a malicious DNS server sending multiple CNAME records in a response. This may lead to arbitrary code execution or a denial of service attack.

EnGarde Community users are urged to upgrade to the most recent version.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Show Comments