In some circumstances, when DNSdist is configured to use the nghttp2 library to process incoming DNS over HTTPS queries, an attacker might be able to cause a denial of service by crafting a DoH exchange that triggers an unbounded I/O read loop, causing an unexpected consumption of CPU resources.
History

Thu, 18 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 18 Sep 2025 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Powerdns
Powerdns dnsdist
Vendors & Products Powerdns
Powerdns dnsdist

Thu, 18 Sep 2025 09:30:00 +0000

Type Values Removed Values Added
Description In some circumstances, when DNSdist is configured to use the nghttp2 library to process incoming DNS over HTTPS queries, an attacker might be able to cause a denial of service by crafting a DoH exchange that triggers an unbounded I/O read loop, causing an unexpected consumption of CPU resources.
Title Denial of service via crafted DoH exchange in PowerDNS DNSdist
Weaknesses CWE-835
References
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: OX

Published: 2025-09-18T09:21:32.274Z

Updated: 2025-09-18T14:03:26.359Z

Reserved: 2025-03-18T08:39:46.884Z

Link: CVE-2025-30187

cve-icon Vulnrichment

Updated: 2025-09-18T13:38:55.274Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-18T10:15:32.993

Modified: 2025-09-18T13:43:34.310

Link: CVE-2025-30187

cve-icon Redhat

No data.