A critical Windows DNS client vulnerability could allow remote attackers to target victim’s computers. The vulnerability, recently discovered by Senior Security Associate Nick Freeman, is highlighted in the Security Week article – Hackers Can Execute Code on Windows via DNS Responses.  

For more technical details on his findings, please read Nick’s blog post A Bug Has No Name: Multiple Heap Buffer Overflows in the Windows DNS Client.