Description
An attacker might be able to trigger a use-after-free by sending crafted DNS queries to a DNSdist using the DNSQuestion:getEDNSOptions method in custom Lua code. In some cases DNSQuestion:getEDNSOptions might refer to a version of the DNS packet that has been modified, thus triggering a use-after-free and potentially a crash resulting in denial of service.
Published: 2026-03-31
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Assess
AI Analysis

Impact

A use‑after‑free flaw exists in DNSdist’s DNSQuestion:getEDNSOptions method, which is invoked by custom Lua code to parse EDNS options from DNS queries. When an attacker sends specially crafted queries that cause DNSQuestion:getEDNSOptions to reference a packet that has already been freed, the process crashes. The result is a denial of service to clients contacting the affected DNSdist instance; the crash does not expose sensitive information but interrupts DNS resolution for legitimate users.

Affected Systems

PowerDNS DNSdist, the high‑performance recursive DNS server that supports custom Lua scripts, is impacted. The vulnerability applies to any DNSdist release in which DNSQuestion:getEDNSOptions has not been patched to guard against use‑after‑free. Specific version numbers are not listed, so all installations that rely on the unpatched Lua routine are considered vulnerable.

Risk and Exploitability

The CVSS score of 4.8 indicates moderate severity, while the EPSS score of less than 1 % suggests a low likelihood of active exploitation. The vulnerability is not included in the CISA Known Exploited Vulnerabilities catalog, further implying limited real‑world impact. Attackers can trigger the flaw remotely by sending crafted DNS queries over the network to a DNSdist instance that processes EDNS options via Lua, without requiring authentication or elevated privileges. Successful exploitation results in the DNSdist process termination, leading to a brief disruption of DNS services.

Generated by OpenCVE AI on April 14, 2026 at 20:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether your DNSdist installation runs custom Lua code that calls DNSQuestion:getEDNSOptions and, if so, disable or remove that code.
  • the DNSdist server updated by monitoring PowerDNS announcements for an official fix and apply the new release as soon as it becomes available.
  • Configure network firewalls or ACLs to limit or block suspicious EDNS query traffic from untrusted sources, reducing the attack surface.
  • Monitor DNSdist logs and system performance for unexpected crashes or service interruptions, and investigate any incidents promptly.

Generated by OpenCVE AI on April 14, 2026 at 20:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:powerdns:dnsdist:*:*:*:*:*:*:*:*

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Powerdns
Powerdns dnsdist
Vendors & Products Powerdns
Powerdns dnsdist

Tue, 31 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Description An attacker might be able to trigger a use-after-free by sending crafted DNS queries to a DNSdist using the DNSQuestion:getEDNSOptions method in custom Lua code. In some cases DNSQuestion:getEDNSOptions might refer to a version of the DNS packet that has been modified, thus triggering a use-after-free and potentially a crash resulting in denial of service.
Title Use after free when parsing EDNS options in Lua
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L'}


Subscriptions

Powerdns Dnsdist
cve-icon MITRE

Status: PUBLISHED

Assigner: OX

Published:

Updated: 2026-04-02T13:46:22.087Z

Reserved: 2026-02-24T08:46:09.373Z

Link: CVE-2026-27854

cve-icon Vulnrichment

Updated: 2026-03-31T13:12:24.381Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T12:16:28.053

Modified: 2026-04-14T16:09:48.420

Link: CVE-2026-27854

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:45:09Z

Weaknesses