Bug 2280227 (CVE-2024-25581) - CVE-2024-25581 dnsdist: Transfer requests received over DoH can lead to a denial of service in DNSdist
Summary: CVE-2024-25581 dnsdist: Transfer requests received over DoH can lead to a den...
Keywords:
Status: NEW
Alias: CVE-2024-25581
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2280228 2280229
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-05-13 13:08 UTC by Rohit Keshri
Modified: 2024-05-13 13:08 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Rohit Keshri 2024-05-13 13:08:27 UTC
Hi all,

We released PowerDNS DNSdist 1.9.4 today. This release fixes 
CVE-2024-25581, a denial of service security issue affecting versions 
1.9.0, 1.9.1, 1.9.2 and 1.9.3 only. Earlier versions are not affected.

When incoming DNS over HTTPS support is enabled using the nghttp2 
provider, and queries are routed to a tcp-only or DNS over TLS backend, 
an attacker can trigger an assertion failure in DNSdist by sending a 
request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing 
the process to stop and thus leading to a Denial of Service.

DNS over HTTPS is not enabled by default, and backends are using plain 
DNS (Do53) by default.

Two work-arounds are available:
- refuse incoming XFR requests via a DNSdist rule: 
addAction(OrRule({QTypeRule(DNSQType.AXFR), QTypeRule(DNSQType.IXFR)}), 
RCodeAction(DNSRCode.REFUSED))
- switch to the legacy h2o provider by setting library='h2o' in the 
addDOHLocal directive

We would like to thank Daniel Stirnimann from Switch for finding and 
subsequently reporting this issue.

The full security advisory is provided below, and can also be
found at
https://dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2024-03.html

A minimal patch can also be found here:
https://downloads.powerdns.com/patches/2024-03/

Please feel free to contact me directly if you have any question.

Best regards,

-- 
Remi Gacogne
PowerDNS.COM BV - https://www.powerdns.com/

PowerDNS Security Advisory 2024-03: Transfer requests received over DoH 
can lead to a denial of service in DNSdist
==================================================================================================================

- CVE: CVE-2024-25581
- Date: May 13th 2024
- Affects: PowerDNS DNSdist 1.9.0, 1.9.1, 1.9.2 and 1.9.3, earlier 
versions are not affected
- Not affected: PowerDNS DNSdist 1.9.4
- Severity: High (only in specific configurations, see below)
- Impact: Denial of service
- Exploit: This problem can be triggered by a remote, unauthenticated 
attacker sending a DNS query
- Risk of system compromise: None
- Solution: Upgrade to patched version or apply the workaround described 
below

When incoming DNS over HTTPS support is enabled using the nghttp2 
provider, and queries are routed to a tcp-only or
DNS over TLS backend, an attacker can trigger an assertion failure in 
DNSdist by sending a request for a zone transfer
(AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus 
leading to a Denial of Service.
DNS over HTTPS is not enabled by default, and backends are using plain 
DNS (Do53) by default.

`CVSS Score: 7.5 
<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1>`__, 
only for configurations where incoming DoH is enabled and a TCP-only/DoT 
backend is enabled.

Two workarounds are available:
- refuse incoming XFR requests via a DNSdist rule: 
``addAction(OrRule({QTypeRule(DNSQType.AXFR), 
QTypeRule(DNSQType.IXFR)}), RCodeAction(DNSRCode.REFUSED))``
- switch to the legacy h2o provider by setting ``library='h2o'`` in the 
``addDOHLocal`` directive

For those unable to upgrade to a new version, a minimal patch is 
`available for 1.9.3 <https://downloads.powerdns.com/patches/2024-03>`__

We would like to thank Daniel Stirnimann from Switch for finding and 
subsequently reporting this issue.

Comment 1 Rohit Keshri 2024-05-13 13:08:51 UTC
Created dnsdist tracking bugs for this issue:

Affects: epel-all [bug 2280228]
Affects: fedora-all [bug 2280229]


Note You need to log in before you can comment on or make changes to this bug.