CVE-2026-24028

An attacker might be able to trigger an out-of-bounds read by sending a crafted DNS response packet, when custom Lua code uses newDNSPacketOverlay to parse DNS packets. The out-of-bounds read might trigger a crash, leading to a denial of service, or access unrelated memory, leading to potential information disclosure.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:powerdns:dnsdist:*:*:*:*:*:*:*:*
cpe:2.3:a:powerdns:dnsdist:*:*:*:*:*:*:*:*

History

14 Apr 2026, 16:27

Type Values Removed Values Added
First Time Powerdns dnsdist
Powerdns
CPE cpe:2.3:a:powerdns:dnsdist:*:*:*:*:*:*:*:*
References () https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-02.html - () https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-02.html - Vendor Advisory

31 Mar 2026, 14:16

Type Values Removed Values Added
CWE CWE-126

31 Mar 2026, 12:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-31 12:16

Updated : 2026-04-14 16:27


NVD link : CVE-2026-24028

Mitre link : CVE-2026-24028

CVE.ORG link : CVE-2026-24028


JSON object : View

Products Affected

powerdns

  • dnsdist
CWE
CWE-126

Buffer Over-read