Metrics
Affected Vendors & Products
Wed, 20 May 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nlnetlabs
Nlnetlabs unbound |
|
| CPEs | cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Nlnetlabs
Nlnetlabs unbound |
|
| Metrics |
cvssV3_1
|
Wed, 20 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NLnet Labs Unbound 1.14.0 up to and including version 1.25.0 has a vulnerability that results in heap overflow when encoding multiple NSID and/or DNS Cookie EDNS and/or EDNS Padding options in the reply packet. The relevant options ('nsid', 'answer-cookie', 'pad-responses' (default)) need to be enabled for the vulnerability to be exploited. An adversary who can query Unbound can exploit the vulnerability by attaching multiple NSID and/or DNS Cookie EDNS and/or EDNS Padding options to the query. A flaw in the size calculation of the EDNS field truncates the correct value which allows the encoder to overflow the available space when writing. Those two combined lead to a heap overflow write of Unbound controlled data and eventually a crash. Unbound 1.25.1 contains a patch with a fix to de-duplicate the EDNS options and a fix to prevent truncation of the EDNS field size calculation. | |
| Title | Heap overflow with multiple NSID, COOKIE, PADDING EDNS options | |
| Weaknesses | CWE-197 CWE-787 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: NLnet Labs
Published:
Updated: 2026-05-20T13:38:17.529Z
Reserved: 2026-05-07T10:07:51.833Z
Link: CVE-2026-42944
Updated: 2026-05-20T13:37:37.199Z
Status : Analyzed
Published: 2026-05-20T10:16:27.760
Modified: 2026-05-20T22:50:49.877
Link: CVE-2026-42944
No data.
OpenCVE Enrichment
Updated: 2026-05-20T11:30:26Z