Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2026-42959— Crash during DNSSEC validation of malicious content

AI Predicted 7.5 Difficulty: Moderate EPSS 0.04% · P14

Possible ATT&CK Techniques 1AI

T1498.002 · Reflection Amplification

Affected Version Matrix 1

VendorProductVersion RangeStatus
NLnet LabsUnbound< 1.25.1affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-42959

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Crash during DNSSEC validation of malicious content
Source: NVD (National Vulnerability Database)
Vulnerability Description
NLnet Labs Unbound up to and including version 1.25.0 has a denial of service vulnerability in the DNSSEC validator that can lead to a crash given malicious upstream replies. When Unbound constructs chase-reply messages for validation, the code uses the wrong counter to calculate write offsets for ADDITIONAL section rrsets. DNAME duplication could increase the ANSWER section count and authority filtering could decrease the AUTHORITY section count and create an uninitialized array slot. Combining these two, the validator later dereferences this uninitialized pointer, causing an immediate process crash. An adversary controlling a DNSSEC-signed domain can trigger this bug with a single query by configuring a DNAME chain with unsigned CNAMEs and a response containing unsigned AUTHORITY records alongside signed ADDITIONAL glue records. Unbound 1.25.1 contains a patch with a fix to use the proper counters to calculate the write offsets.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用未经初始化的指针
Source: NVD (National Vulnerability Database)
Vulnerability Title
NLnet Labs Unbound 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
NLnet Labs Unbound是NLnet Labs开源的一个高性能DNS解析器。 NLnet Labs Unbound 1.25.0及之前版本存在缓冲区错误漏洞,该漏洞源于DNSSEC验证器中使用错误计数器计算写入偏移量,导致未初始化指针被引用,可能造成进程崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
NLnet LabsUnbound 0 ~ 1.25.1 -

II. Public POCs for CVE-2026-42959

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-42959

登录查看更多情报信息。

Vendor Advisories for CVE-2026-42959 (1)

Same Patch Batch · NLnet Labs · 2026-05-20 · 11 CVEs total

CVE-2026-41292Long list of incoming EDNS options degrades performance
CVE-2026-42923Degradation of service with unbounded NSEC3 hash calculations
CVE-2026-42944Heap overflow with multiple NSID, COOKIE, PADDING EDNS options
CVE-2026-42960Possible cache poisoning via promiscuous records for the authority section
CVE-2026-42534Jostle logic bypass degrades resolution performance
CVE-2026-32792Packet of death with DNSCrypt
CVE-2026-40622Another 'ghost domain names' attack variant
CVE-2026-44390Unbounded name compression in certain cases causes degradation of service
CVE-2026-44608Use after free and crash under special conditions in RPZ code
CVE-2026-33278Possible arbitrary code execution during DNSSEC validation

IV. Related Vulnerabilities

V. Comments for CVE-2026-42959

No comments yet


Leave a comment