First published: Tue Apr 29 2025(Updated: )
When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by crafting a DoH exchange that triggers an illegal memory access (double-free) and crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.9 version. A workaround is to temporarily switch to the h2o provider until DNSdist has been upgraded to a fixed version. We would like to thank Charles Howes for bringing this issue to our attention.
Credit: security@open-xchange.com
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS | >1.9.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-30194 is classified as a denial of service vulnerability.
To fix CVE-2025-30194, upgrade to the patched version of DNSdist, specifically version 1.9.9 or later.
CVE-2025-30194 affects PowerDNS DNSdist when configured to provide DoH via the nghttp2 provider.
CVE-2025-30194 involves an attacker triggering a denial of service through an illegal memory access leading to a crash.
Yes, CVE-2025-30194 can be exploited remotely by an attacker crafting a specific DoH exchange.