CVE-2026-24028
MEDIUMOut-of-bounds read when parsing DNS packets via Lua
Title source: cnaDescription
An attacker might be able to trigger an out-of-bounds read by sending a crafted DNS response packet, when custom Lua code uses newDNSPacketOverlay to parse DNS packets. The out-of-bounds read might trigger a crash, leading to a denial of service, or access unrelated memory, leading to potential information disclosure.
Scores
CVSS v3
5.3
EPSS
0.0001
EPSS Percentile
0.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-126
Status
published
Products (3)
PowerDNS/DNSdist
1.9.0 - 1.9.12
powerdns/dnsdist
1.9.0 - 1.9.12
PowerDNS/DNSdist
2.0.0 - 2.0.3
Published
Mar 31, 2026
Tracked Since
Mar 31, 2026