Metrics
Affected Vendors & Products
Thu, 21 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 20 May 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nlnetlabs
Nlnetlabs unbound |
|
| CPEs | cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Nlnetlabs
Nlnetlabs unbound |
|
| Metrics |
cvssV3_1
|
Wed, 20 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NLnet Labs Unbound 1.19.1 up to and including version 1.25.0 has a vulnerability in the DNSSEC validator that enables denial of service and possible remote code execution as a result of deep copying a data structure and erroneously overwriting a destination pointer. An adversary can exploit the vulnerability by controlling a malicious signed zone and querying a vulnerable Unbound. When DS sub-queries need to suspend validation due to NSEC3 computational budget exhaustion (introduced in Unbound 1.19.1), Unbound deep-copies response messages to preserve them across memory region teardown. A struct-assignment bug overwrites the destination's pointer with the source's pointer. After the sub-query region is freed, the resumed validator dereferences this dangling pointer, triggering a crash or potentially enabling arbitrary code execution. Unbound 1.25.1 contains a patch with a fix to preserve the correct pointer when deep copying the data structure. | |
| Title | Possible arbitrary code execution during DNSSEC validation | |
| Weaknesses | CWE-416 CWE-672 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: NLnet Labs
Published:
Updated: 2026-05-20T12:13:09.692Z
Reserved: 2026-05-07T10:07:51.853Z
Link: CVE-2026-33278
Updated: 2026-05-20T12:13:06.187Z
Status : Analyzed
Published: 2026-05-20T10:16:26.530
Modified: 2026-05-20T22:49:23.313
Link: CVE-2026-33278
OpenCVE Enrichment
Updated: 2026-05-20T11:30:26Z