CVE-2026-24028 in PowerDNS DNSdist
Resumen (Inglés)
An attacker might be able to trigger an out-of-bounds read by sending a crafted DNS response packet, when custom Lua code uses newDNSPacketOverlay to parse DNS packets. The out-of-bounds read might trigger a crash, leading to a denial of service, or access unrelated memory, leading to potential information disclosure.
Reservar
2026-01-20
Divulgación
2026-03-31
Voces
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerabilidad | CWE | Exp | Con | CVE |
|---|---|---|---|---|---|
| 354366 | PowerDNS DNSdist newDNSPacketOverlay divulgación de información | 125 | No está definido | Arreglo oficial | CVE-2026-24028 |