Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-55g9-rgmx-hvww

Опубликовано: 14 мая 2024
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.

When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.

EPSS

Процентиль: 2%
0.00014
Низкий

7.5 High

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.

CVSS3: 7.5
nvd
больше 1 года назад

When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.

CVSS3: 7.5
debian
больше 1 года назад

When incoming DNS over HTTPS support is enabled using the nghttp2 prov ...

CVSS3: 7.5
fstec
больше 1 года назад

Уязвимость балансировщика нагрузки и прокси для DNS-трафика DNSdist, связанная с неконтролируемым достижимым утверждением, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
redos
4 месяца назад

Уязвимость dnsdist

EPSS

Процентиль: 2%
0.00014
Низкий

7.5 High

CVSS3

Дефекты

CWE-20