Home

Description

NLnet Labs Unbound up to and including version 1.25.0 has a denial of service vulnerability in the DNSSEC validator that can lead to a crash given malicious upstream replies. When Unbound constructs chase-reply messages for validation, the code uses the wrong counter to calculate write offsets for ADDITIONAL section rrsets. DNAME duplication could increase the ANSWER section count and authority filtering could decrease the AUTHORITY section count and create an uninitialized array slot. Combining these two, the validator later dereferences this uninitialized pointer, causing an immediate process crash. An adversary controlling a DNSSEC-signed domain can trigger this bug with a single query by configuring a DNAME chain with unsigned CNAMEs and a response containing unsigned AUTHORITY records alongside signed ADDITIONAL glue records. Unbound 1.25.1 contains a patch with a fix to use the proper counters to calculate the write offsets.

PUBLISHED Reserved 2026-05-07 | Published 2026-05-20 | Updated 2026-05-20 | Assigner NLnet Labs




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/U:Red

Problem types

CWE-824: Access of Uninitialized Pointer

Product status

Default status
unaffected

Any version before 1.25.1
affected

Timeline

2026-04-15:Issue reported by Qifan Zhang
2026-04-29:NLnet Labs shares patch
2026-04-29:Qifan Zhang verifies patch
2026-05-20:Fixes released with version 1.25.1

Credits

Qifan Zhang (Palo Alto Networks) finder

References

www.nlnetlabs.nl/downloads/unbound/CVE-2026-42959.txt vendor-advisory

cve.org (CVE-2026-42959)

nvd.nist.gov (CVE-2026-42959)

Download JSON