Out-of-Bounds Read Vulnerability in PowerDNS from PowerDNS
CVE-2026-24028

5.3MEDIUM

Key Information:

Vendor

Powerdns

Status
Vendor
CVE Published:
31 March 2026

What is CVE-2026-24028?

An attacker can exploit a vulnerability in PowerDNS by sending a specially crafted DNS response packet. This manipulation targets the parsing function responsible for handling DNS packets with custom Lua code. If successful, this can lead to an out-of-bounds read, which may result in a denial of service by crashing the application or potentially accessing sensitive and unrelated memory. Thus, the exploitation of this vulnerability poses a significant risk to the integrity and confidentiality of the system.

Affected Version(s)

DNSdist 1.9.0 < 1.9.12

DNSdist 2.0.0 < 2.0.3

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Naoki Wakamatsu
.