Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-25581

Опубликовано: 14 мая 2024
Источник: debian
EPSS Низкий

Описание

When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dnsdistfixed1.9.4-1package
dnsdistnot-affectedbookwormpackage
dnsdistnot-affectedbullseyepackage
dnsdistnot-affectedbusterpackage

Примечания

  • https://dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2024-03.html

  • Patches: https://downloads.powerdns.com/patches/2024-03/

EPSS

Процентиль: 2%
0.00014
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.

CVSS3: 7.5
nvd
больше 1 года назад

When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.

CVSS3: 7.5
github
больше 1 года назад

When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.

CVSS3: 7.5
fstec
больше 1 года назад

Уязвимость балансировщика нагрузки и прокси для DNS-трафика DNSdist, связанная с неконтролируемым достижимым утверждением, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
redos
4 месяца назад

Уязвимость dnsdist

EPSS

Процентиль: 2%
0.00014
Низкий