{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-20T11:07:09.576","vulnerabilities":[{"cve":{"id":"CVE-2024-25581","sourceIdentifier":"security@open-xchange.com","published":"2024-05-14T15:05:29.707","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default."},{"lang":"es","value":"Cuando la compatibilidad con DNS entrante sobre HTTPS está habilitada mediante el proveedor nghttp2 y las consultas se enrutan a un backend solo tcp o DNS sobre TLS, un atacante puede desencadenar una falla de aserción en DNSdist enviando una solicitud de transferencia de zona (AXFR o IXFR). a través de DNS a través de HTTPS, lo que provoca que el proceso se detenga y, por lo tanto, conduce a una Denegación de Servicio. DNS sobre HTTPS no está habilitado de forma predeterminada y los servidores utilizan DNS simple (Do53) de forma predeterminada."}],"metrics":{"cvssMetricV31":[{"source":"security@open-xchange.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@open-xchange.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2024/05/13/1","source":"security@open-xchange.com"},{"url":"https://dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2024-03.html","source":"security@open-xchange.com"},{"url":"http://www.openwall.com/lists/oss-security/2024/05/13/1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2024-03.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}