An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available this usually results in an exception and the QUIC connection is properly closed, but in some cases the system might enter an out-of-memory state instead and terminate the process.
| Vendor | Product | Versions |
|---|---|---|
| powerdns | dnsdist | 1.9.0, 2.0.0 |
Updated affected versions to include 1.9.11 and 2.0.2, changed severity to HIGH, and noted that no exploit exists.
Initial creation