Critical vulnerabilities in the Windows DNS client were recently discovered by Senior Security Associate Nick Freeman. The vulnerabilities that could lead to a takeover of user machines are discussed in this Help Net Security article – Bugs in Windows DNS Client Open Millions of Users to Attack. Fixes for these memory corruption vulnerabilities were included in Microsoft’s Patch Tuesday security update today.

You can read more about Nick’s research in his blog post A Bug Has No Name: Multiple Heap Buffers Overflows in the Windows DNS Client.