Kaminsky says a flaw found in the Gnu C standard library, aka “glibc,” can trick browsers into looking up shady domain names. Servers could then reply with overly-long DNS names, causing a buffer overflow in the victim’s software. That would in turn let hackers execute code remotely and possibly take over a machine. The bug is new and has been around since May 2008. Kaminsky said “the buggy code has been around for quite some time, so it’s really worked its way across the globe.” In other words, it could ages for the fix to be applied broadly. It has not yet been established that the code can be executed remotely nor has it been found to be exploited in the wild. Redhat, which discovered the vulnerability along with Google, said that “a back of the envelope analysis shows that it should be possible to write correctly formed DNS responses with attacker controlled payloads that will penetrate a DNS cache hierarchy and therefore allow attackers to exploit machines behind such caches.” Kaminsky says that the bug makes servers vulnerable to man-in-the-middle attacks right now, if hackers gain access to certain servers. Kaminsky calls a “solid critical vulnerability by any normal standard.” Now, the only question is whether things will get much worse. Click here if you’re a DNS expert and don’t need to be told how DNS works. Click here if your interests are around security policy implications and not the specific technical flaw in question.