When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by crafting a DoH exchange that triggers an illegal memory access (double-free) and crash of DNSdist, causing a denial of service.
The remedy is: upgrade to the patched 1.9.9 version.
A workaround is to temporarily switch to the h2o provider until DNSdist has been upgraded to a fixed version.
We would like to thank Charles Howes for bringing this issue to our attention.
References
Configurations
No configuration.
History
29 Apr 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Apr 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-29 12:15
Updated : 2025-04-29 14:15
NVD link : CVE-2025-30194
Mitre link : CVE-2025-30194
CVE.ORG link : CVE-2025-30194
JSON object : View
Products Affected
No product.
CWE
CWE-416
Use After Free