Microsoft issued patches for three critical Windows DNS client vulnerabilities today that could make users open to malicious attacker. These vulnerabilities were recently discovered Senior Security Associate Nick Freeman and are highlighted in this Dark Reading article – Microsoft Patches Windows Zero-Day Flaws Tied to DNSSEC.

For more details on Nick’s research, check out his blog post A Bug Has No Name: Multiple Heap Buffer Overflows in the Windows DNS Client.