Secondary Vulnerabilities
Problem:
- Programs are using the data returned from DNS and assuming it is well-formed with the result that the program allows intruders to compromise the supporting host
- bad names
- bad addresses
- using h_length field
- CA-96:04 Corrupt Information from Servers