Assigner | OX |
Reserved | 2024-02-08 |
Published | 2024-05-13 |
Updated | 2024-06-04 |
Description
When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Problem types
CWE-20 Improper Input Validation
Product status
1.9.0
1.9.1
1.9.2
1.9.3
Credits
Daniel Stirnimann from Switch
References
https://dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2024-03.html