Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27853: Out-of-bounds Write in PowerDNS DNSdist

0
Medium
VulnerabilityCVE-2026-27853cvecve-2026-27853
Published: Tue Mar 31 2026 (03/31/2026, 12:04:23 UTC)
Source: CVE Database V5
Vendor/Project: PowerDNS
Product: DNSdist

Description

CVE-2026-27853 is a medium-severity vulnerability in PowerDNS DNSdist versions 1. 9. 0 and 2. 0. 0 that allows an attacker to trigger an out-of-bounds write by sending crafted DNS responses exploiting the DNSQuestion:changeName or DNSResponse:changeName methods in custom Lua scripts. This can cause the rewritten DNS packet to exceed the maximum allowed size of 65535 bytes, potentially leading to a crash and denial of service. The vulnerability does not impact confidentiality or integrity but affects availability. Exploitation requires network access but no authentication or user interaction, and the attack complexity is high due to the need for crafted DNS responses and custom Lua code usage. No known exploits are currently reported in the wild. Organizations using affected DNSdist versions should apply patches or implement strict input validation and limit Lua script usage to trusted code.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 12:38:35 UTC

Technical Analysis

CVE-2026-27853 is an out-of-bounds write vulnerability identified in PowerDNS DNSdist versions 1.9.0 and 2.0.0. The issue arises when an attacker sends specially crafted DNS responses that interact with the DNSQuestion:changeName or DNSResponse:changeName methods within custom Lua scripts configured in DNSdist. These methods allow modification of DNS packet names, but improper handling can cause the rewritten DNS packet to grow beyond the original size and potentially exceed the DNS protocol maximum packet size of 65535 bytes. This overflow can lead to memory corruption, resulting in a crash of the DNSdist service and causing a denial of service (DoS) condition. The vulnerability does not allow for code execution or data leakage but impacts service availability. Exploitation requires the attacker to send malicious DNS responses to a DNSdist instance that is running vulnerable versions and has Lua scripting enabled with these specific methods in use. The attack vector is network-based with no authentication or user interaction required, but the complexity is elevated due to the need to craft precise DNS responses and Lua code conditions. No public exploits have been reported yet, but the vulnerability is publicly disclosed with a CVSS v3.1 score of 5.9, reflecting medium severity. The vulnerability highlights the risks of dynamic DNS packet manipulation via Lua scripting without adequate bounds checking.

Potential Impact

The primary impact of CVE-2026-27853 is denial of service caused by DNSdist crashes due to out-of-bounds writes when processing malicious DNS responses. For organizations relying on DNSdist for DNS load balancing, filtering, or security, this can lead to DNS service interruptions, affecting domain resolution and potentially disrupting critical network services and applications. While confidentiality and integrity are not directly compromised, the availability impact can degrade user experience, cause operational downtime, and increase incident response costs. Large-scale or targeted attacks could amplify disruption, especially in environments where DNSdist is a key component of DNS infrastructure. Organizations with high DNS query volumes or those using custom Lua scripts for DNS packet manipulation are particularly vulnerable. The lack of known exploits reduces immediate risk, but the medium severity score and potential for DoS warrant prompt mitigation.

Mitigation Recommendations

To mitigate CVE-2026-27853, organizations should upgrade affected DNSdist instances to patched versions once available from PowerDNS. Until patches are released, administrators should audit and restrict the use of Lua scripting, especially the DNSQuestion:changeName and DNSResponse:changeName methods, to trusted scripts only. Implement strict input validation and size checks within Lua scripts to prevent packet size expansion beyond protocol limits. Network-level controls such as filtering or rate limiting suspicious DNS responses can reduce exposure. Monitoring DNSdist logs for crashes or unusual DNS response patterns can aid early detection. Additionally, deploying redundant DNS infrastructure and failover mechanisms can minimize service disruption in case of exploitation. Regularly reviewing and updating DNSdist configurations and applying security best practices for DNS services will further reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
OX
Date Reserved
2026-02-24T08:46:09.373Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cbbcb5e6bfc5ba1d1244f3

Added to database: 3/31/2026, 12:23:17 PM

Last enriched: 3/31/2026, 12:38:35 PM

Last updated: 3/31/2026, 1:29:36 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses