The read_config_file function in lib/hesiod.c in Hesiod 3.2.1 falls back to the ".athena.mit.edu" default domain when opening the configuration file fails, which allows remote attackers to gain root privileges by poisoning the DNS cache.
https://security.gentoo.org/glsa/201805-01
https://github.com/achernya/hesiod/pull/10
https://bugzilla.redhat.com/show_bug.cgi?id=1332493