Xerox Corporation Information for VU#738331

Domain Name System (DNS) resolver libraries vulnerable to read buffer overflow

Status

Affected

Vendor Statement

A response to this vulnerability is available from our web site:

    http://www.xerox.com/security/

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Vendor References

    None

    Addendum

    The CERT/CC has no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.