CVE-2024-25581

7.5 HIGH

📋 TL;DR

This vulnerability allows an attacker to cause a denial of service in DNSdist by sending a DNS zone transfer request (AXFR/IXFR) over DNS over HTTPS when specific configurations are enabled. It affects DNSdist installations with DoH enabled using the nghttp2 provider and backends configured for TCP-only or DNS over TLS. The service crashes due to an assertion failure.

💻 Affected Systems

Products:
  • DNSdist
Versions: All versions before 1.9.4 and 1.10.0
Operating Systems: All platforms running DNSdist
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when DNS over HTTPS is enabled using nghttp2 provider AND backends use TCP-only or DNS over TLS. DoH is disabled by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

DNSdist process crashes, causing complete DNS resolution failure for all clients relying on it, leading to extended service outage.

🟠

Likely Case

Targeted DoS attack against vulnerable DNSdist instances, causing temporary service disruption until process restarts.

🟢

If Mitigated

No impact if DoH is disabled or proper filtering/patches are applied.

🌐 Internet-Facing: HIGH if DoH is enabled and exposed to untrusted networks, as unauthenticated attackers can trigger the crash.
🏢 Internal Only: MEDIUM if DoH is enabled internally, requiring attacker access to internal network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple DoS attack requiring only ability to send crafted DoH requests. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: DNSdist 1.9.4 and 1.10.0

Vendor Advisory: https://dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2024-03.html

Restart Required: Yes

Instructions:

1. Download patched version from PowerDNS repository. 2. Stop DNSdist service. 3. Install updated package. 4. Restart DNSdist service. 5. Verify service is running and responding.

🔧 Temporary Workarounds

Disable DNS over HTTPS

all

Disable DoH functionality entirely if not required.

# Edit DNSdist configuration and remove/comment DoH settings
# Remove lines like: addDOHLocal('0.0.0.0:443')

Filter AXFR/IXFR requests

all

Add rule to block zone transfer requests over DoH.

# Add to DNSdist config:
addAction(MakeRule('\\. IN AXFR'), DropAction())
addAction(MakeRule('\\. IN IXFR'), DropAction())

🧯 If You Can't Patch

  • Disable DNS over HTTPS support completely
  • Implement network filtering to block AXFR/IXFR requests from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check DNSdist configuration for DoH enabled with nghttp2 provider and TCP/TLS backends. Check version with 'dnsdist --version'.

Check Version:

dnsdist --version

Verify Fix Applied:

Verify version is 1.9.4 or 1.10.0 or higher. Test DoH functionality remains operational.

📡 Detection & Monitoring

Log Indicators:

  • DNSdist process crashes/restarts
  • Assertion failure logs mentioning DoH or AXFR/IXFR

Network Indicators:

  • Unusual volume of DoH requests for AXFR/IXFR queries

SIEM Query:

source="dnsdist" AND ("assertion failure" OR "crash" OR "AXFR" OR "IXFR")

🔗 References

📤 Share & Export