Description
An attacker might be able to trigger an out-of-bounds write by sending crafted DNS responses to a DNSdist using the DNSQuestion:changeName or DNSResponse:changeName methods in custom Lua code. In some cases the rewritten packet might become larger than the initial response and even exceed 65535 bytes, potentially leading to a crash resulting in denial of service.
Published: 2026-03-31
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Assess Impact
AI Analysis

Impact

An out‑of‑bounds write can be triggered in PowerDNS DNSdist when an attacker sends specially crafted DNS responses that use the DNSQuestion:changeName or DNSResponse:changeName methods in custom Lua code. The rewritten packet may become larger than the original and exceed the 65535‑byte limit, causing the DNSdist process to crash. This crash results in a denial of service for clients relying on the affected DNS server. The weakness is classified as CWE‑787.

Affected Systems

The vulnerability affects the DNSdist component of PowerDNS. No specific product or version numbers are disclosed in the advisory, so any deployment of DNSdist that processes or rewrites packets through the mentioned Lua methods is potentially at risk.

Risk and Exploitability

The CVSS score of 5.9 indicates moderate severity, while the EPSS score of less than 1% suggests a low likelihood of immediate exploitation. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker would need to send crafted DNS responses to a DNSdist instance that runs custom Lua scripts employing the changeName methods. Without such scripts, the attack surface is limited, but the potential for a crash remains a concern for environments requiring high availability.

Generated by OpenCVE AI on April 14, 2026 at 19:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and apply the latest DNSdist release that addresses the out‑of‑bounds write issue.
  • If no patch is available, remove or disable DNSQuestion:changeName and DNSResponse:changeName calls from custom Lua scripts to prevent large packet rewrites.
  • Restrict external access to the DNSdist server with firewalls or network segmentation to reduce exposure to crafted DNS responses.
  • Monitor DNSdist logs for crash events or abnormal packet size entries and investigate promptly.

Generated by OpenCVE AI on April 14, 2026 at 19:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6235-1 dnsdist security update
History

Tue, 14 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:powerdns:dnsdist:*:*:*:*:*:*:*:*

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Powerdns
Powerdns dnsdist
Vendors & Products Powerdns
Powerdns dnsdist

Tue, 31 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Description An attacker might be able to trigger an out-of-bounds write by sending crafted DNS responses to a DNSdist using the DNSQuestion:changeName or DNSResponse:changeName methods in custom Lua code. In some cases the rewritten packet might become larger than the initial response and even exceed 65535 bytes, potentially leading to a crash resulting in denial of service.
Title Out-of-bounds write when rewriting large DNS packets
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Powerdns Dnsdist
cve-icon MITRE

Status: PUBLISHED

Assigner: OX

Published:

Updated: 2026-03-31T13:17:25.025Z

Reserved: 2026-02-24T08:46:09.373Z

Link: CVE-2026-27853

cve-icon Vulnrichment

Updated: 2026-03-31T13:13:57.021Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T12:16:27.917

Modified: 2026-04-14T16:12:32.463

Link: CVE-2026-27853

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:45:09Z

Weaknesses