When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by crafting a DoH exchange that triggers an illegal memory access (double-free) and crash of DNSdist, causing a denial of service.
The remedy is: upgrade to the patched 1.9.9 version.
A workaround is to temporarily switch to the h2o provider until DNSdist has been upgraded to a fixed version.
We would like to thank Charles Howes for bringing this issue to our attention.
Metrics
Affected Vendors & Products
References
History
Tue, 29 Apr 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 29 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 29 Apr 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by crafting a DoH exchange that triggers an illegal memory access (double-free) and crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.9 version. A workaround is to temporarily switch to the h2o provider until DNSdist has been upgraded to a fixed version. We would like to thank Charles Howes for bringing this issue to our attention. | |
Title | Denial of service via crafted DoH exchange | |
Weaknesses | CWE-416 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: OX
Published: 2025-04-29T11:25:47.141Z
Updated: 2025-04-29T13:25:09.226Z
Reserved: 2025-03-18T08:39:46.884Z
Link: CVE-2025-30194

Updated: 2025-04-29T13:12:34.483Z

Status : Awaiting Analysis
Published: 2025-04-29T12:15:31.983
Modified: 2025-04-29T14:15:32.390
Link: CVE-2025-30194

No data.