Vulnerability Details CVE-2026-27854
An attacker might be able to trigger a use-after-free by sending crafted DNS queries to a DNSdist using the DNSQuestion:getEDNSOptions method in custom Lua code. In some cases DNSQuestion:getEDNSOptions might refer to a version of the DNS packet that has been modified, thus triggering a use-after-free and potentially a crash resulting in denial of service.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 1.3%
CVSS Severity
CVSS v3 Score 4.8
Products affected by CVE-2026-27854
-
cpe:2.3:a:powerdns:dnsdist:1.9.0
-
cpe:2.3:a:powerdns:dnsdist:1.9.1
-
cpe:2.3:a:powerdns:dnsdist:1.9.10
-
cpe:2.3:a:powerdns:dnsdist:1.9.11
-
cpe:2.3:a:powerdns:dnsdist:1.9.2
-
cpe:2.3:a:powerdns:dnsdist:1.9.3
-
cpe:2.3:a:powerdns:dnsdist:1.9.4
-
cpe:2.3:a:powerdns:dnsdist:1.9.5
-
cpe:2.3:a:powerdns:dnsdist:1.9.6
-
cpe:2.3:a:powerdns:dnsdist:1.9.7
-
cpe:2.3:a:powerdns:dnsdist:1.9.8
-
cpe:2.3:a:powerdns:dnsdist:1.9.9
-
cpe:2.3:a:powerdns:dnsdist:2.0.0
-
cpe:2.3:a:powerdns:dnsdist:2.0.1
-
cpe:2.3:a:powerdns:dnsdist:2.0.2