An attacker might be able to trigger an out-of-bounds write by sending crafted DNS responses to a DNSdist using the DNSQuestion:changeName or DNSResponse:changeName methods in custom Lua code. In some cases the rewritten packet might become larger than the initial response and even exceed 65535 bytes, potentially leading to a crash resulting in denial of service.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 31 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker might be able to trigger an out-of-bounds write by sending crafted DNS responses to a DNSdist using the DNSQuestion:changeName or DNSResponse:changeName methods in custom Lua code. In some cases the rewritten packet might become larger than the initial response and even exceed 65535 bytes, potentially leading to a crash resulting in denial of service. | |
| Title | Out-of-bounds write when rewriting large DNS packets | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2026-03-31T13:17:25.025Z
Reserved: 2026-02-24T08:46:09.373Z
Link: CVE-2026-27853
No data.
Status : Received
Published: 2026-03-31T12:16:27.917
Modified: 2026-03-31T12:16:27.917
Link: CVE-2026-27853
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.