Follow @Openwall on Twitter for new release announcements and other news
[<prev] [day] [month] [year] [list]
Message-ID: <ced17fcc-4496-4f30-9783-0d08d80e2346@powerdns.com>
Date: Thu, 18 Sep 2025 11:25:20 +0200
From: Remi Gacogne <remi.gacogne@...erdns.com>
To: oss-security@...ts.openwall.com
Subject: PowerDNS Security Advisory 2025-05 for DNSdist: Denial of service via
 crafted DoH exchange

Hi all,

Today we have released PowerDNS DNSdist 1.9.11 and 2.0.1. These releases 
fix PowerDNS Security Advisory 2025-05 for DNSdist, a denial of service 
via crafted DoH exchange.
While working on adding mitigations against the MadeYouReset 
(CVE-2025-8671) attack, we noticed a potential denial of service in our 
DNS over HTTPS implementation when using the nghttp2 provider: an 
attacker might be able to cause a denial of service by crafting a DoH 
exchange that triggers an unbounded I/O read loop, causing an unexpected 
consumption of CPU resources. We assigned CVE-2025-30187 to this issue. 
The offending code was introduced in DNSdist 1.9.0-alpha1 so previous 
versions are not affected.

The full security advisory is provided below, and can also be
found at
https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2025-05.html

Minimal patches can also be found here:
https://downloads.powerdns.com/patches/2025-05/

Please feel free to contact me directly if you have any question.

PowerDNS Security Advisory 2025-05 for DNSdist: Denial of service via 
crafted DoH exchange

- CVE: CVE-2025-30187
- Date: 2025-09-18T12:00:00+02:00
- Discovery date: 2025-08-26T00:00:00+02:00
- Affects: PowerDNS DNSdist from 1.9.0 to 1.9.10, 2.0.0
- Not affected: PowerDNS DNSdist < 1.9.0, 1.9.11, 2.0.1
- Severity: Low
- Impact: Denial of service
- Exploit: This problem can be triggered by an attacker crafting a DoH 
exchange
- Risk of system compromise: None
- Solution: Upgrade to patched version or use the h2o provider
- CWE: CWE-835
- CVSS: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
- Last affected: 1.9.10,2.0.0
- First fixed: 1.9.11,2.0.1
- Internal ID: 308

In some circumstances, when DNSdist is configured to use the nghttp2 
library to process incoming DNS over HTTPS queries, an attacker might be 
able to cause a denial of service by crafting a DoH exchange that 
triggers an unbounded I/O read loop, causing an unexpected consumption 
of CPU resources.
The offending code was introduced in DNSdist 1.9.0-alpha1 so previous 
versions are not affected.

The remedy is: upgrade to a patched version, or switch to the h2o provider.


Best regards,
-- 
Remi Gacogne
PowerDNS.COM BV - https://www.powerdns.com/

Download attachment "OpenPGP_signature.asc" of type "application/pgp-signature" (489 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.