An attacker might be able to trigger an out-of-bounds read by sending a crafted DNS response packet, when custom Lua code uses newDNSPacketOverlay to parse DNS packets. The out-of-bounds read might trigger a crash, leading to a denial of service, or access unrelated memory, leading to potential information disclosure.
| Vendor | Product | Versions |
|---|---|---|
| powerdns | dnsdist | 1.9.0, 2.0.0 |
Updated affected versions to include 1.9.11 and 2.0.2, changed severity to HIGH, and noted that the vulnerability is actively exploited.
Initial creation