CVE-2026-27853
EUVD-2026-1740731.03.2026, 12:16
An attacker might be able to trigger an out-of-bounds write by sending crafted DNS responses to a DNSdist using the DNSQuestion:changeName or DNSResponse:changeName methods in custom Lua code. In some cases the rewritten packet might become larger than the initial response and even exceed 65535 bytes, potentially leading to a crash resulting in denial of service.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| powerdns | dnsdist | 1.9.0 ≤ 𝑥 < 1.9.12 |
| powerdns | dnsdist | 2.0.0 ≤ 𝑥 < 2.0.3 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration