The flaw can be exploited to conduct denial-of-service attacks or remote hijacking.from Latest topics for ZDNet in Security http://ift.tt/1FAoNCq