Heap-based buffer overflow in dns.cpp in InspIRCd 2.0.5 might allow remote attackers to execute arbitrary code via a crafted DNS query that uses compression.Referenceshttp://www.securityfocus.com/bid/52561http://osvdb.org/80263http://www.debian.org/security/2012/dsa-2448https://exchange.xforce.ibmcloud.com/vulnerabilities/74157http://secunia.com/advisories/48474https://github.com/inspircd/inspircd/commit/fe7dbd2c104c37f6f3af7d9f1646a3c332aea4a4http://www.kb.cert.org/vuls/id/212651