Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2026-32792— Packet of death with DNSCrypt

AI Predicted 5.3 Difficulty: Hard EPSS 0.04% · P14

Possible ATT&CK Techniques 1AI

T1498 · Network Denial of Service

Affected Version Matrix 1

VendorProductVersion RangeStatus
NLnet LabsUnbound1.6.2< 1.25.1affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-32792

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Packet of death with DNSCrypt
Source: NVD (National Vulnerability Database)
Vulnerability Description
NLnet Labs Unbound 1.6.2 up to and including version 1.25.0 has a denial of service vulnerability when compiled with DNSCrypt support ('--enable-dnscrypt'). A bad DNSCrypt query could underflow Unbound's DNSCrypt packet reading procedure that may lead to heap overflow. A malicious actor can exploit the vulnerability with a single bad DNSCrypt query that its decrypted plaintext consists entirely of '0x00' bytes and does not contain the expected '0x80' marker. Unbound would then start reading more bytes than necessary until it finds a non-'0x00' byte. Based on the underlying memory allocator and the memory layout, it could lead to heap overflow while reading followed by a crash. Likelihood of a crash is low, since it relies heavily on the underlying memory allocator and the memory layout. If the heap overflow does not happen, Unbound's later packet checks will deny the packet. Unbound 1.25.1 contains a patch with a fix to bound reading in the given buffer space.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
缺失特殊元素净化处理不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
NLnet Labs Unbound 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
NLnet Labs Unbound是NLnet Labs开源的一个高性能DNS解析器。 NLnet Labs Unbound 1.6.2版本至1.25.0版本存在缓冲区错误漏洞,该漏洞源于DNSCrypt数据包读取过程下溢可能导致堆溢出。恶意攻击者可利用单个恶意DNSCrypt查询触发漏洞,其解密明文完全由0x00字节组成且不包含预期的0x80标记,导致Unbound读取超出必要字节。基于底层内存分配器和内存布局,可能导致堆溢出并引发崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
NLnet LabsUnbound 1.6.2 ~ 1.25.1 -

II. Public POCs for CVE-2026-32792

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-32792

登录查看更多情报信息。

Other References for CVE-2026-32792 (1)

Same Patch Batch · NLnet Labs · 2026-05-20 · 11 CVEs total

CVE-2026-41292Long list of incoming EDNS options degrades performance
CVE-2026-42959Crash during DNSSEC validation of malicious content
CVE-2026-42923Degradation of service with unbounded NSEC3 hash calculations
CVE-2026-42944Heap overflow with multiple NSID, COOKIE, PADDING EDNS options
CVE-2026-42960Possible cache poisoning via promiscuous records for the authority section
CVE-2026-42534Jostle logic bypass degrades resolution performance
CVE-2026-40622Another 'ghost domain names' attack variant
CVE-2026-44390Unbounded name compression in certain cases causes degradation of service
CVE-2026-44608Use after free and crash under special conditions in RPZ code
CVE-2026-33278Possible arbitrary code execution during DNSSEC validation

IV. Related Vulnerabilities

V. Comments for CVE-2026-32792

No comments yet


Leave a comment