CVE-2024-25581

When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.
Configurations

No configuration.

History

10 Jun 2024, 18:15

Type Values Removed Values Added
Summary
  • (es) Cuando la compatibilidad con DNS entrante sobre HTTPS está habilitada mediante el proveedor nghttp2 y las consultas se enrutan a un backend solo tcp o DNS sobre TLS, un atacante puede desencadenar una falla de aserción en DNSdist enviando una solicitud de transferencia de zona (AXFR o IXFR). a través de DNS a través de HTTPS, lo que provoca que el proceso se detenga y, por lo tanto, conduce a una Denegación de Servicio. DNS sobre HTTPS no está habilitado de forma predeterminada y los servidores utilizan DNS simple (Do53) de forma predeterminada.
References
  • () http://www.openwall.com/lists/oss-security/2024/05/13/1 -

14 May 2024, 15:05

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-14 15:05

Updated : 2024-06-10 18:15


NVD link : CVE-2024-25581

Mitre link : CVE-2024-25581

CVE.ORG link : CVE-2024-25581


JSON object : View

Products Affected

No product.

CWE
CWE-20

Improper Input Validation