TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2026-32936

N/A

Beschreibung

CoreDNS is a DNS server that chains plugins. In versions prior to 1.14.3, the DNS-over-HTTPS (DoH) GET path accepts oversized dns= query parameter values and performs URL query parsing, base64 decoding, and DNS message unpacking before rejecting the request. Unlike the POST path, which applies a bounded read via http.MaxBytesReader limited to 65536 bytes, the GET path has no equivalent size validation before expensive processing. A remote, unauthenticated attacker can repeatedly send oversized DoH GET requests to force high CPU usage, large transient memory allocations, and elevated garbage-collection pressure, leading to denial of service. This issue has been fixed in version 1.14.3.

CVE Details

CVSS v3.1 BewertungN/A
Veroffentlicht5/5/2026
Zuletzt geandert5/5/2026
Quellenvd
Honeypot-Sichtungen0

Schwachen (CWE)

CWE-400

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.