<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:* — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/cpes/cpe2.3anlnetlabsunbound/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 07:14:22 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/cpes/cpe2.3anlnetlabsunbound/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-44390 Unbounded Name Compression Denial-of-Service Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-unbounded-name-compression-dos/</link><pubDate>Thu, 21 May 2026 07:14:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-unbounded-name-compression-dos/</guid><description>CVE-2026-44390 is a denial-of-service vulnerability in Microsoft products due to unbounded name compression.</description><content:encoded><![CDATA[<p>CVE-2026-44390 describes a denial-of-service vulnerability affecting Microsoft products. The vulnerability stems from unbounded name compression, which can lead to excessive resource consumption when processing crafted network packets. Successful exploitation could result in a degradation of service, impacting the availability of affected systems. Defenders should apply relevant patches as soon as possible to mitigate this risk. This vulnerability has the potential to disrupt critical services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Due to the limited information available, a detailed attack chain cannot be fully constructed. However, a general outline based on the nature of the vulnerability is provided below:</p>
<ol>
<li>An attacker crafts a malicious network packet containing a DNS record with unbounded name compression.</li>
<li>The attacker sends the crafted packet to a vulnerable Microsoft service that handles DNS requests.</li>
<li>The vulnerable service attempts to process the malicious DNS record.</li>
<li>The unbounded name compression causes the service to enter a loop or consume excessive memory.</li>
<li>Resource exhaustion leads to performance degradation.</li>
<li>The service becomes unresponsive or crashes, resulting in a denial-of-service condition.</li>
<li>Legitimate users are unable to access the service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-44390 leads to a denial-of-service condition, impacting the availability of critical Microsoft services. The extent of the impact depends on the specific service affected and the scale of the attack. Affected organizations may experience disruptions in network services, application downtime, and reduced productivity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate network traffic for anomalous DNS packets exhibiting characteristics of unbounded name compression (refer to CVE-2026-44390).</li>
<li>Deploy the Sigma rules provided to detect potential exploitation attempts.</li>
<li>Monitor system resource usage (CPU, memory) for services processing network packets.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>dos</category><category>cve</category><category>denial-of-service</category></item><item><title>CVE-2026-42944: Heap Overflow with Multiple NSID, COOKIE, and PADDING EDNS Options</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-42944/</link><pubDate>Thu, 21 May 2026 07:14:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-42944/</guid><description>Microsoft disclosed CVE-2026-42944, a heap overflow vulnerability related to the processing of multiple NSID, COOKIE, and PADDING EDNS options in an unspecified product.</description><content:encoded><![CDATA[<p>On May 21, 2026, Microsoft published information regarding CVE-2026-42944, a heap overflow vulnerability. This vulnerability stems from the processing of multiple NSID, COOKIE, and PADDING Extended DNS (EDNS) options. The specifics of the affected product and the precise attack vector remain undisclosed in the initial advisory. The vulnerability&rsquo;s impact could lead to denial of service or potentially remote code execution. Further details will likely be released as they become available, but defenders should prepare for the potential of exploit development and in-the-wild attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Given the limited information, the following attack chain is a hypothetical reconstruction based on typical heap overflow exploitation scenarios:</p>
<ol>
<li>An attacker crafts a malicious DNS packet containing multiple NSID, COOKIE, and PADDING EDNS options.</li>
<li>The malicious DNS packet is sent to a vulnerable DNS server or client.</li>
<li>The vulnerable software attempts to parse and process the EDNS options within the DNS packet.</li>
<li>Due to improper validation of the number or size of these options, a heap buffer is allocated based on attacker-controlled values.</li>
<li>When writing the EDNS options into the heap buffer, the software overflows the buffer due to the excessive number and/or size of NSID, COOKIE, and PADDING options.</li>
<li>The heap overflow corrupts adjacent memory structures, potentially overwriting function pointers or critical data.</li>
<li>The attacker leverages the memory corruption to achieve arbitrary code execution or cause a denial-of-service condition.</li>
<li>If code execution is achieved, the attacker can install malware, exfiltrate data, or pivot to other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-42944 could lead to a denial-of-service condition on affected DNS servers or clients, disrupting network services. In a more severe scenario, the vulnerability may allow for remote code execution, granting an attacker the ability to gain control of the compromised system. This could enable data theft, malware deployment, or further lateral movement within the network. The extent of the impact depends on the specific product affected and the privileges of the exploited process.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for suspicious DNS packets containing an unusually large number of NSID, COOKIE, and PADDING EDNS options using a network intrusion detection system (NIDS).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious DNS Packets with Excessive EDNS Options</code> to identify potential exploitation attempts in network traffic.</li>
<li>Once the affected product is identified by Microsoft, apply the security patch as soon as it becomes available to remediate CVE-2026-42944.</li>
<li>Enable DNS query logging to facilitate investigation of suspicious DNS traffic.</li>
<li>Monitor for unusual process behavior following DNS queries, such as unexpected process creation or network connections, using endpoint detection and response (EDR) solutions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>heap-overflow</category><category>dns</category><category>edns</category><category>denial-of-service</category></item></channel></rss>