CVE-2024-25581

EUVD-2024-22909
When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
OXCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 2%
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
powerdnsdnsdist
1.9.0
CNA
powerdnsdnsdist
1.9.1
CNA
powerdnsdnsdist
1.9.2
CNA
powerdnsdnsdist
1.9.3
CNA
Debian logo
Debian Releases
Debian Product
Codename
dnsdist
bookworm
1.7.3-2
not-affected
bullseye
1.5.1-3
not-affected
buster
not-affected
forky
2.0.2-1
fixed
sid
2.0.2-1
fixed
trixie
1.9.10-1+deb13u1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dnsdist
bionic
not-affected
focal
not-affected
jammy
not-affected
mantic
not-affected
noble
not-affected
xenial
not-affected