Home

Description

Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to 26.4.0rc2, the twisted.names module is vulnerable to a Denial of Service (DoS) attack via resource exhaustion during DNS name decompression. A remote, unauthenticated attacker can exploit this by sending a crafted TCP DNS packet containing deeply chained compression pointers. This flaw bypasses previous loop-prevention logic, causing the single-threaded Twisted reactor to hang while processing millions of recursive lookups, effectively freezing the server. This vulnerability is fixed in 26.4.0rc2.

PUBLISHED Reserved 2026-04-26 | Published 2026-05-13 | Updated 2026-05-14 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-400: Uncontrolled Resource Consumption

CWE-407: Inefficient Algorithmic Complexity

Product status

< 26.4.0rc2
affected

References

github.com/...wisted/security/advisories/GHSA-grgv-6hw6-v9g4 exploit

github.com/...wisted/security/advisories/GHSA-grgv-6hw6-v9g4

cve.org (CVE-2026-42304)

nvd.nist.gov (CVE-2026-42304)

Download JSON