Powerdns

Dnsdist

25 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 10:16:51
  • Zuletzt bearbeitet 27.04.2026 17:03:56

An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.

  • EPSS 0.01%
  • Veröffentlicht 31.03.2026 12:16:28
  • Zuletzt bearbeitet 14.04.2026 16:09:48

An attacker might be able to trigger a use-after-free by sending crafted DNS queries to a DNSdist using the DNSQuestion:getEDNSOptions method in custom Lua code. In some cases DNSQuestion:getEDNSOptions might refer to a version of the DNS packet that...

  • EPSS 0.01%
  • Veröffentlicht 31.03.2026 12:16:27
  • Zuletzt bearbeitet 14.04.2026 16:12:32

An attacker might be able to trigger an out-of-bounds write by sending crafted DNS responses to a DNSdist using the DNSQuestion:changeName or DNSResponse:changeName methods in custom Lua code. In some cases the rewritten packet might become larger th...

  • EPSS 0.01%
  • Veröffentlicht 31.03.2026 12:16:27
  • Zuletzt bearbeitet 14.04.2026 16:15:28

An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available this usually results in an ex...

  • EPSS 0%
  • Veröffentlicht 31.03.2026 12:16:27
  • Zuletzt bearbeitet 14.04.2026 16:24:27

When the early_acl_drop (earlyACLDrop in Lua) option is disabled (default is enabled) on a DNS over HTTPs frontend using the nghttp2 provider, the ACL check is skipped, allowing all clients to send DoH queries regardless of the configured ACL.

  • EPSS 0.01%
  • Veröffentlicht 31.03.2026 12:16:27
  • Zuletzt bearbeitet 14.04.2026 16:27:24

An attacker might be able to trigger an out-of-bounds read by sending a crafted DNS response packet, when custom Lua code uses newDNSPacketOverlay to parse DNS packets. The out-of-bounds read might trigger a crash, leading to a denial of service, or ...

  • EPSS 0%
  • Veröffentlicht 31.03.2026 11:53:13
  • Zuletzt bearbeitet 14.04.2026 16:27:53

When the internal webserver is enabled (default is disabled), an attacker might be able to trick an administrator logged to the dashboard into visiting a malicious website and extract information about the running configuration from the dashboard. Th...

  • EPSS 0%
  • Veröffentlicht 31.03.2026 11:50:51
  • Zuletzt bearbeitet 13.04.2026 12:46:34

An attacker might be able to inject HTML content into the internal web dashboard by sending crafted DNS queries to a DNSdist instance where domain-based dynamic rules have been enabled via either DynBlockRulesGroup:setSuffixMatchRule or DynBlockRules...

  • EPSS 0.01%
  • Veröffentlicht 18.09.2025 09:21:32
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In some circumstances, when DNSdist is configured to use the nghttp2 library to process incoming DNS over HTTPS queries, an attacker might be able to cause a denial of service by crafting a DoH exchange that triggers an unbounded I/O read loop, causi...

  • EPSS 0.15%
  • Veröffentlicht 20.05.2025 11:17:17
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In some circumstances, when DNSdist is configured to allow an unlimited number of queries on a single, incoming TCP connection from a client, an attacker can cause a denial of service by crafting a TCP exchange that triggers an exhaustion of the stac...