7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.2 High
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
9.1%
When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | dnsdist | < 1.7.3-2 | dnsdist_1.7.3-2_all.deb |
Debian | 11 | all | dnsdist | < 1.5.1-3 | dnsdist_1.5.1-3_all.deb |
Debian | 10 | all | dnsdist | < 1.3.3-3 | dnsdist_1.3.3-3_all.deb |
Debian | 999 | all | dnsdist | < 1.9.4-1 | dnsdist_1.9.4-1_all.deb |
Debian | 13 | all | dnsdist | < 1.9.4-1 | dnsdist_1.9.4-1_all.deb |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.2 High
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
9.1%