CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-25581: Transfer requests received over DoH can lead to a denial of service in DNSdist

7.5 CVSS

Description

When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.

Classification

CVE ID: CVE-2024-25581

CVSS Base Severity: HIGH

CVSS Base Score: 7.5

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products

Vendor: PowerDNS

Product: DNSdist

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 11.98% (scored less or equal to compared to others)

EPSS Date: 2025-03-14 (when was this score calculated)

References

https://dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2024-03.html
http://www.openwall.com/lists/oss-security/2024/05/13/1

Timeline