When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.
References
Configurations
No configuration.
History
21 Nov 2024, 09:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2024/05/13/1 - | |
References | () https://dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2024-03.html - |
10 Jun 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
14 May 2024, 15:05
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-14 15:05
Updated : 2024-11-21 09:01
NVD link : CVE-2024-25581
Mitre link : CVE-2024-25581
CVE.ORG link : CVE-2024-25581
JSON object : View
Products Affected
No product.
CWE
CWE-20
Improper Input Validation