Powerdns

Dnsdist

7 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Published 18.09.2025 09:21:32
  • Last modified 18.09.2025 13:43:34

In some circumstances, when DNSdist is configured to use the nghttp2 library to process incoming DNS over HTTPS queries, an attacker might be able to cause a denial of service by crafting a DoH exchange that triggers an unbounded I/O read loop, causi...

  • EPSS 0.07%
  • Published 20.05.2025 11:17:17
  • Last modified 21.05.2025 20:25:16

In some circumstances, when DNSdist is configured to allow an unlimited number of queries on a single, incoming TCP connection from a client, an attacker can cause a denial of service by crafting a TCP exchange that triggers an exhaustion of the stac...

  • EPSS 0.11%
  • Published 29.04.2025 11:25:47
  • Last modified 20.06.2025 16:15:28

When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by crafting a DoH exchange that triggers an illegal memory access (double-free) and crash of DNSdist, causing a denial of service. The reme...

  • EPSS 0.01%
  • Published 14.05.2024 15:05:29
  • Last modified 13.02.2025 18:17:14

When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) ...

  • EPSS 0.01%
  • Published 26.11.2018 23:29:00
  • Last modified 21.11.2024 03:49:32

An issue has been found in PowerDNS DNSDist before 1.3.3 allowing a remote attacker to craft a DNS query with trailing data such that the addition of a record by dnsdist, for example an OPT record when adding EDNS Client Subnet, might result in the t...

  • EPSS 0.02%
  • Published 11.09.2018 13:29:00
  • Last modified 21.11.2024 02:57:23

An issue has been found in dnsdist before 1.2.0 in the way EDNS0 OPT records are handled when parsing responses from a backend. When dnsdist is configured to add EDNS Client Subnet to a query, the response may contain an EDNS0 OPT record that has to ...

  • EPSS 0%
  • Published 22.08.2017 14:29:00
  • Last modified 20.04.2025 01:37:25

dnsdist version 1.1.0 is vulnerable to a flaw in authentication mechanism for REST API potentially allowing CSRF attack.