Critical vulnerabilities in the Windows DNS client that could allow remote code execution on victim's computers are discussed in this iTnews article - Microsoft Patches Windows DNSEC Zero-Day. These vulnerabilities were recently discovered by Senior Security Associate Nick Freeman. Fixes for these memory corruption vulnerabilities were included in Microsoft’s Patch Tuesday security update.

You can read more about Nick’s research in his blog post A Bug Has No Name: Multiple Heap Buffers Overflows in the Windows DNS Client.