fkie_cve-2025-30193
Vulnerability from fkie_nvd
Published
2025-05-20 12:15
Modified
2025-05-21 20:25
Summary
In some circumstances, when DNSdist is configured to allow an unlimited number of queries on a single, incoming TCP connection from a client, an attacker can cause a denial of service by crafting a TCP exchange that triggers an exhaustion of the stack and a crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.10 version. A workaround is to restrict the maximum number of queries on incoming TCP connections to a safe value, like 50, via the setMaxTCPQueriesPerConnection setting. We would like to thank Renaud Allard for bringing this issue to our attention.
Impacted products
Vendor Product Version



{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In some circumstances, when DNSdist is configured to allow an unlimited number of queries on a single, incoming TCP connection from a client, an attacker can cause a denial of service by crafting a TCP exchange that triggers an exhaustion of the stack and a crash of DNSdist, causing a denial of service.\n\nThe remedy is: upgrade to the patched 1.9.10 version.\n\nA workaround is to restrict the maximum number of queries on incoming TCP connections to a safe value, like 50, via the setMaxTCPQueriesPerConnection setting.\n\nWe would like to thank Renaud Allard for bringing this issue to our attention."
    },
    {
      "lang": "es",
      "value": "En algunas circunstancias, cuando DNSdist est\u00e1 configurado para permitir un n\u00famero ilimitado de consultas en una \u00fanica conexi\u00f3n TCP entrante desde un cliente, un atacante puede provocar una denegaci\u00f3n de servicio manipulando un intercambio TCP que provoca el agotamiento de la pila y un bloqueo de DNSdist, lo que provoca una denegaci\u00f3n de servicio. La soluci\u00f3n es actualizar a la versi\u00f3n 1.9.10 con el parche. Una alternativa consiste en restringir el n\u00famero m\u00e1ximo de consultas en las conexiones TCP entrantes a un valor seguro, como 50, mediante la configuraci\u00f3n setMaxTCPQueriesPerConnection. Agradecemos a Renaud Allard por informarnos sobre este problema."
    }
  ],
  "id": "CVE-2025-30193",
  "lastModified": "2025-05-21T20:25:16.407",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "security@open-xchange.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-05-20T12:15:19.697",
  "references": [
    {
      "source": "security@open-xchange.com",
      "url": "https://dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2025-03.html"
    }
  ],
  "sourceIdentifier": "security@open-xchange.com",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-674"
        }
      ],
      "source": "security@open-xchange.com",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…