Three critical Windows DNS client vulnerabilities recently discovered by Senior Security Associate Nick Freeman were patched today by Microsoft and Windows users are advised to implement the patch immediately. The vulnerabilities and their risks are highlighted in the Threatpost article – Microsoft Patches Critical Windows DNS Client Vulnerabilities.

For more details on his research and findings, read Nick’s blog post A Bug Has No Name: Multiple Heap Buffer Overflows in the Windows DNS Client.