Impact
The vulnerability allows a client to force the DNSdist server to allocate excessive memory by issuing many queries that are routed to an overloaded DoH backend. These queries accumulate in a buffer that is only released when the connection ends, leading to runaway memory consumption that can degrade performance or cause the server to crash. The weakness is classified as CWE-770, which covers excessive allocation of resources.
Affected Systems
Affected systems include the PowerDNS DNSdist service. The advisory does not provide specific version numbers, so all currently deployed instances of DNSdist may be susceptible until a patch is applied.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, and no EPSS score is available. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the client has the ability to trigger the exploit by sending a high volume of queries; no privileged access is required, so the potential threat vector is remote from any internet‑connected client.
OpenCVE Enrichment
Debian DSA