CVE-2026-42304 PUBLISHED

Twisted: Denial of Service (DoS) in twisted.names via Crafted DNS Compression Pointer Chains

Assigner: GitHub_M
Reserved: 26.04.2026 Published: 13.05.2026 Updated: 13.05.2026

Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to 26.4.0rc2, the twisted.names module is vulnerable to a Denial of Service (DoS) attack via resource exhaustion during DNS name decompression. A remote, unauthenticated attacker can exploit this by sending a crafted TCP DNS packet containing deeply chained compression pointers. This flaw bypasses previous loop-prevention logic, causing the single-threaded Twisted reactor to hang while processing millions of recursive lookups, effectively freezing the server. This vulnerability is fixed in 26.4.0rc2.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS Score: 7.5

Product Status

Vendor twisted
Product twisted
Versions
  • Version < 26.4.0rc2 is affected

References

Problem Types

  • CWE-400: Uncontrolled Resource Consumption CWE
  • CWE-407: Inefficient Algorithmic Complexity CWE