Follow @Openwall on Twitter for new release announcements and other news
[<prev] [day] [month] [year] [list]
Message-ID: <3ea22ba2-6be3-42d6-8b4d-d98dcf4e4b2f@powerdns.com>
Date: Tue, 29 Apr 2025 13:39:36 +0200
From: Remi Gacogne <remi.gacogne@...erdns.com>
To: oss-security@...ts.openwall.com
Subject: PowerDNS Security Advisory 2025-02: Denial of service via crafted DoH
 exchange

Hi all,

We released PowerDNS DNSdist 1.9.9 today, an emergency release fixing a 
security issue tracked as CVE-2025-30194 where a remote, unauthenticated 
attacker can cause a denial of service via a crafted DNS over HTTPS 
connection. The issue was reported to us via our public GitHub tracker, 
so once it was clear that the issue had a security impact we prepared to 
release a new version as soon as possible.

While we advise upgrading to a fixed version, a work-around is to 
temporarily switch to the h2o provider until DNSdist has been upgraded.

We would like to thank Charles Howes for bringing this issue to our 
attention.

The full security advisory is provided below, and can also be
found at
https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2025-02.html

A minimal patch can also be found here:
https://downloads.powerdns.com/patches/2025-02/

Please feel free to contact me directly if you have any question.

PowerDNS Security Advisory 2025-02 for DNSdist: Denial of service via 
crafted DoH exchange

- CVE: CVE-2025-30194
- Date: 2025-04-29T12:00:00+02:00
- Discovery date: 2025-04-25T21:55:00+02:00
- Affects: PowerDNS DNSdist from 1.9.0 up to 1.9.8
- Not affected: PowerDNS DNSdist 1.9.9 and versions before 1.9.0
- Severity: High
- Impact: Denial of service
- Exploit: This problem can be triggered by an attacker crafting a DoH 
exchange
- Risk of system compromise: None
- Solution: Upgrade to patched version or temporarily switch to the h2o 
provider
- CWE: CWE-416
- CVSS: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Last affected: 1.9.8
- First fixed: 1.9.9
- Internal ID: 297

When DNSdist is configured to provide DoH via the nghttp2 provider, an 
attacker can cause a denial of service by crafting a DoH exchange that 
triggers an illegal memory access (double-free) and crash of DNSdist, 
causing a denial of service.

CVSS Score: 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, only for 
configurations where incoming DoH is enabled via the nghttp2 provider.

The remedy is: upgrade to the patched 1.9.9 version.

A workaround is to temporarily switch to the h2o provider until DNSdist 
has been upgraded to a fixed version.

We would like to thank Charles Howes for bringing this issue to our 
attention.


Best regards,
-- 
Remi Gacogne
PowerDNS.COM BV - https://www.powerdns.com/

Download attachment "OpenPGP_signature.asc" of type "application/pgp-signature" (489 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.