In some circumstances, when DNSdist is configured to use the nghttp2 library to process incoming DNS over HTTPS queries, an attacker might be able to cause a denial of service by crafting a DoH exchange that triggers an unbounded I/O read loop, causing an unexpected consumption of CPU resources.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 18 Sep 2025 09:30:00 +0000

Type Values Removed Values Added
Description In some circumstances, when DNSdist is configured to use the nghttp2 library to process incoming DNS over HTTPS queries, an attacker might be able to cause a denial of service by crafting a DoH exchange that triggers an unbounded I/O read loop, causing an unexpected consumption of CPU resources.
Title Denial of service via crafted DoH exchange in PowerDNS DNSdist
Weaknesses CWE-835
References
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: OX

Published:

Updated: 2025-09-18T09:21:32.274Z

Reserved: 2025-03-18T08:39:46.884Z

Link: CVE-2025-30187

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-18T10:15:32.993

Modified: 2025-09-18T10:15:32.993

Link: CVE-2025-30187

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.