Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-30193

Опубликовано: 20 мая 2025
Источник: debian
EPSS Низкий

Описание

In some circumstances, when DNSdist is configured to allow an unlimited number of queries on a single, incoming TCP connection from a client, an attacker can cause a denial of service by crafting a TCP exchange that triggers an exhaustion of the stack and a crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.10 version. A workaround is to restrict the maximum number of queries on incoming TCP connections to a safe value, like 50, via the setMaxTCPQueriesPerConnection setting. We would like to thank Renaud Allard for bringing this issue to our attention.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dnsdistfixed1.9.10-1package
dnsdistend-of-lifebookwormpackage
dnsdistend-of-lifebullseyepackage

Примечания

  • https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2025-03.html

  • https://github.com/PowerDNS/pdns/pull/15572

  • Fixed by: https://github.com/PowerDNS/pdns/commit/096c0fc0c015e80f815eb99aea1bc0eca28cb269 (dnsdist-1.9.10)

  • Fixed by: https://github.com/PowerDNS/pdns/commit/3a2a8dfdf0d9e43ba13973d31e3c6fb2da228099 (dnsdist-1.9.10)

EPSS

Процентиль: 21%
0.00069
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
8 месяцев назад

In some circumstances, when DNSdist is configured to allow an unlimited number of queries on a single, incoming TCP connection from a client, an attacker can cause a denial of service by crafting a TCP exchange that triggers an exhaustion of the stack and a crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.10 version. A workaround is to restrict the maximum number of queries on incoming TCP connections to a safe value, like 50, via the setMaxTCPQueriesPerConnection setting. We would like to thank Renaud Allard for bringing this issue to our attention.

CVSS3: 7.5
nvd
8 месяцев назад

In some circumstances, when DNSdist is configured to allow an unlimited number of queries on a single, incoming TCP connection from a client, an attacker can cause a denial of service by crafting a TCP exchange that triggers an exhaustion of the stack and a crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.10 version. A workaround is to restrict the maximum number of queries on incoming TCP connections to a safe value, like 50, via the setMaxTCPQueriesPerConnection setting. We would like to thank Renaud Allard for bringing this issue to our attention.

suse-cvrf
8 месяцев назад

Security update for dnsdist

suse-cvrf
8 месяцев назад

Security update for dnsdist

CVSS3: 7.5
github
8 месяцев назад

In some circumstances, when DNSdist is configured to allow an unlimited number of queries on a single, incoming TCP connection from a client, an attacker can cause a denial of service by crafting a TCP exchange that triggers an exhaustion of the stack and a crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.10 version. A workaround is to restrict the maximum number of queries on incoming TCP connections to a safe value, like 50, via the setMaxTCPQueriesPerConnection setting. We would like to thank Renaud Allard for bringing this issue to our attention.

EPSS

Процентиль: 21%
0.00069
Низкий