Lucene search

K
vulnrichmentOXVULNRICHMENT:CVE-2024-25581
HistoryMay 13, 2024 - 11:49 a.m.

CVE-2024-25581 Transfer requests received over DoH can lead to a denial of service in DNSdist

2024-05-1311:49:24
CWE-20
OX
github.com
4
cve-2024-25581
doh
dos
dnsdist

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.8

Confidence

High

EPSS

0

Percentile

9.0%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:powerdns:dnsdist:1.9.0:*:*:*:*:*:*:*"
    ],
    "vendor": "powerdns",
    "product": "dnsdist",
    "versions": [
      {
        "status": "affected",
        "version": "1.9.0"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:powerdns:dnsdist:1.9.1:*:*:*:*:*:*:*"
    ],
    "vendor": "powerdns",
    "product": "dnsdist",
    "versions": [
      {
        "status": "affected",
        "version": "1.9.1"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:powerdns:dnsdist:1.9.2:*:*:*:*:*:*:*"
    ],
    "vendor": "powerdns",
    "product": "dnsdist",
    "versions": [
      {
        "status": "affected",
        "version": "1.9.2"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:powerdns:dnsdist:1.9.3:*:*:*:*:*:*:*"
    ],
    "vendor": "powerdns",
    "product": "dnsdist",
    "versions": [
      {
        "status": "affected",
        "version": "1.9.3"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.8

Confidence

High

EPSS

0

Percentile

9.0%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial