NA

CVE-2024-25581

Published: 14/05/2024 Updated: 14/05/2024

Vulnerability Summary

When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.

Vulnerability Trend

Vendor Advisories

Debian Bug report logs - #1071750 dnsdist: CVE-2024-25581 Package: src:dnsdist; Maintainer for src:dnsdist is dnsdist packagers <dnsdist@packagesdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Fri, 24 May 2024 14:57:09 UTC Severity: important Tags: security Reply or subscribe to this bug T ...

Mailing Lists

Hi all, Two work-arounds are available: The full security advisory is provided below, and can also be found at dnsdistorg/security-advisories/powerdns-advisory-for-dnsdist-2024-03html A minimal patch can also be found here: downloadspowerdnscom/patches/2024-03/ Please feel free to contact me directly if you have any ...