CVE-2026-32792
Heap Overflow in Unbound DNS Server via DNSCrypt
Publication date: 2026-05-20
Last updated on: 2026-05-20
Assigner: NLnet Labs
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nlnet_labs | unbound | From 1.6.2 (inc) to 1.25.0 (inc) |
| nlnet_labs | unbound | 1.25.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
| CWE-166 | The product receives input from an upstream component, but it does not handle or incorrectly handles when an expected special element is missing. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-32792 is a denial of service vulnerability in NLnet Labs Unbound versions 1.6.2 up to 1.25.0 when compiled with DNSCrypt support. It occurs because a specially crafted DNSCrypt query containing only '0x00' bytes and missing the expected '0x80' marker causes Unbound to read more bytes than necessary. This excessive reading can lead to a heap overflow and potentially crash the application.
How can this vulnerability impact me? :
This vulnerability can cause Unbound to crash due to a heap overflow triggered by a malicious DNSCrypt query. The impact is a denial of service, meaning that the DNS service provided by Unbound could become unavailable or unstable, potentially disrupting network operations that rely on it.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for DNSCrypt queries that consist entirely of 0x00 bytes and lack the expected 0x80 marker. Such malformed queries may trigger the vulnerability in affected Unbound versions.
Specific commands to detect this vulnerability are not provided in the available resources.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, upgrade Unbound to version 1.25.1 or later, which contains a patch that bounds reading within the buffer space to prevent the heap overflow.
Alternatively, manually apply the patch provided for versions up to 1.25.0 if upgrading is not immediately possible.