CVE-2026-24028 PUBLISHED

Out-of-bounds read when parsing DNS packets via Lua

Assigner: OX
Reserved: 20.01.2026 Published: 31.03.2026 Updated: 31.03.2026

An attacker might be able to trigger an out-of-bounds read by sending a crafted DNS response packet, when custom Lua code uses newDNSPacketOverlay to parse DNS packets. The out-of-bounds read might trigger a crash, leading to a denial of service, or access unrelated memory, leading to potential information disclosure.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVSS Score: 5.3

Product Status

Vendor PowerDNS
Product DNSdist
Versions Default: unaffected
  • affected from 1.9.0 to 1.9.12 (excl.)
  • affected from 2.0.0 to 2.0.3 (excl.)

Credits

  • Naoki Wakamatsu finder

References

Problem Types

  • Buffer Over-read CWE