Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.Referenceshttp://www.securityfocus.com/bid/11527http://marc.info/?l=bugtraq&m=109882085912915&w=2https://exchange.xforce.ibmcloud.com/vulnerabilities/17878