Sending a maliciously crafted message to the kea-ctrl...
High severity
Unreviewed
Published
Mar 25, 2026
to the GitHub Advisory Database
•
Updated Mar 25, 2026
Description
Published by the National Vulnerability Database
Mar 25, 2026
Published to the GitHub Advisory Database
Mar 25, 2026
Last updated
Mar 25, 2026
Sending a maliciously crafted message to the kea-ctrl-agent, kea-dhcp-ddns, kea-dhcp4, or kea-dhcp6 daemons over any configured API socket or HA listener can cause the receiving daemon to exit with a stack overflow error.
This issue affects Kea versions 2.6.0 through 2.6.4 and 3.0.0 through 3.0.2.
References