SGI Information for VU#738331

Domain Name System (DNS) resolver libraries vulnerable to read buffer overflow

Status

Not Affected

Vendor Statement

SGI uses nsd (UNS name service daemon) as a resolver and it does not appear to be vulnerable as it does not use any of the res_* functions.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

None

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.