Количество 6
Количество 6
CVE-2024-25581
When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.
CVE-2024-25581
When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.
CVE-2024-25581
When incoming DNS over HTTPS support is enabled using the nghttp2 prov ...
GHSA-55g9-rgmx-hvww
When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.
BDU:2025-11269
Уязвимость балансировщика нагрузки и прокси для DNS-трафика DNSdist, связанная с неконтролируемым достижимым утверждением, позволяющая нарушителю вызвать отказ в обслуживании
ROS-20250911-01
Уязвимость dnsdist
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-25581 When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад | |
CVE-2024-25581 When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад | |
CVE-2024-25581 When incoming DNS over HTTPS support is enabled using the nghttp2 prov ... | CVSS3: 7.5 | 0% Низкий | больше 1 года назад | |
GHSA-55g9-rgmx-hvww When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад | |
BDU:2025-11269 Уязвимость балансировщика нагрузки и прокси для DNS-трафика DNSdist, связанная с неконтролируемым достижимым утверждением, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 0% Низкий | больше 1 года назад | |
ROS-20250911-01 Уязвимость dnsdist | CVSS3: 7.5 | 0% Низкий | 4 месяца назад |
Уязвимостей на страницу