Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a hostname with an escaped trailing dot.
https://source.android.com/security/bulletin/2017-01-01.html
https://security.gentoo.org/glsa/201701-28
https://googlechromereleases.blogspot.in/2016/09/stable-channel-updates-for-chrome-os.html
https://c-ares.haxx.se/adv_20160929.html
https://c-ares.haxx.se/CVE-2016-5180.patch
http://www.ubuntu.com/usn/USN-3143-1
http://www.securityfocus.com/bid/93243