CVE-2025-30194
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
29/04/2025
Last modified:
15/04/2026
Description
When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by crafting a DoH exchange that triggers an illegal memory access (double-free) and crash of DNSdist, causing a denial of service.<br />
<br />
The remedy is: upgrade to the patched 1.9.9 version.<br />
<br />
A workaround is to temporarily switch to the h2o provider until DNSdist has been upgraded to a fixed version.<br />
<br />
We would like to thank Charles Howes for bringing this issue to our attention.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
References to Advisories, Solutions, and Tools
- https://dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2025-02.html
- http://www.openwall.com/lists/oss-security/2025/04/29/1
- https://www.vicarius.io/vsociety/posts/cve-2025-30194-detection-dnsdist-vulnerability
- https://www.vicarius.io/vsociety/posts/cve-2025-30194-mitigate-dnsdist-vulnerability



