Threatpost - Microsoft Patches Critical Windows DNS Client Vulnerabilities

Posted on Oct 10, 2017 12:15:40 PM

Three critical Windows DNS client vulnerabilities recently discovered by Senior Security Associate Nick Freeman were patched today by Microsoft and Windows users are advised to implement the patch immediately. The vulnerabilities and their risks are highlighted in the Threatpost article - Microsoft Patches Critical Windows DNS Client Vulnerabilities.

For more details on his research and findings, read Nick's blog post A Bug Has No Name: Multiple Heap Buffer Overflows in the Windows DNS Client.




Submit a Media Request

Please get in touch with our PR Team for any press or PR related inquiries.



Subscribe to Updates