Full title: Microsoft DNS dnslint.exe Tool Forced Drive-By Download Vulnerability Category: remote exploits Platform: windows Microsoft's dnslint.exe tool does not verify domain names when parsing DNS text-files using the "/ql" switch making it prone to forced drive-by downloads, providing an end user is tricked into using a server text-file containing a script/binary reference instead of a normally expected domain name. # 0day.today @ http://0day.today/