Use-After-Free Vulnerability in DNSdist by PowerDNS
CVE-2026-27854

4.8MEDIUM

Key Information:

Vendor

Powerdns

Status
Vendor
CVE Published:
31 March 2026

What is CVE-2026-27854?

A vulnerability in PowerDNS's DNSdist could lead to a use-after-free condition when an attacker sends specially crafted DNS queries. By exploiting the DNSQuestion:getEDNSOptions method in custom Lua scripts, the attacker might manipulate the DNS packet versions, resulting in a scenario where invalid memory is accessed. This could cause the system to crash, leading to service disruptions and potential denial of service.

Affected Version(s)

DNSdist 1.9.0 < 1.9.12

DNSdist 2.0.0 < 2.0.3

References

CVSS V3.1

Score:
4.8
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Naoki Wakamatsu
.