Report: CVE-2026-42579 - Netty: DNS Codec Input Validation Bypass in Netty (Encoder + Decoder) - Complete Guide
CVE ID :CVE-2026-42579 Published : May 13, 2026, 7:17 p.m. | 29 minutes ago Description :Netty is an asynchronous, event-driven network application framework. Prior to 4.2.13.Final and 4.1.133.Final, Netty's DNS codec does not enforce RFC 1035 domain name constraints during either encoding or decoding. This creates a bidirectional attack surface: malicious DNS responses can exploit the decoder, and user-influenced hostnames can exploit the encoder. This vulnerability is fixed in 4.2.13.Final and 4.1.133.Final. Severity: 7.5 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...