CVE-2026-24028 in PowerDNS DNSdistinformación

Resumen (Inglés)

An attacker might be able to trigger an out-of-bounds read by sending a crafted DNS response packet, when custom Lua code uses newDNSPacketOverlay to parse DNS packets. The out-of-bounds read might trigger a crash, leading to a denial of service, or access unrelated memory, leading to potential information disclosure.

Reservar

2026-01-20

Divulgación

2026-03-31

Voces

VulDB provides additional information and datapoints for this CVE:

Do you want to use VulDB in your project?

Use the official API to access entries easily!