Detailed analysis of security vulnerabilities
Talkd, when given corrupt DNS information, can be used to execute arbitrary commands with root privileges.
Talkd, when given corrupt DNS information, can be used to execute arbitrary commands with root privileges.