Vulnerability Details CVE-2026-24030
An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available this usually results in an exception and the QUIC connection is properly closed, but in some cases the system might enter an out-of-memory state instead and terminate the process.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 2.8%
CVSS Severity
CVSS v3 Score 5.3
Products affected by CVE-2026-24030
-
cpe:2.3:a:powerdns:dnsdist:1.9.0
-
cpe:2.3:a:powerdns:dnsdist:1.9.1
-
cpe:2.3:a:powerdns:dnsdist:1.9.10
-
cpe:2.3:a:powerdns:dnsdist:1.9.11
-
cpe:2.3:a:powerdns:dnsdist:1.9.2
-
cpe:2.3:a:powerdns:dnsdist:1.9.3
-
cpe:2.3:a:powerdns:dnsdist:1.9.4
-
cpe:2.3:a:powerdns:dnsdist:1.9.5
-
cpe:2.3:a:powerdns:dnsdist:1.9.6
-
cpe:2.3:a:powerdns:dnsdist:1.9.7
-
cpe:2.3:a:powerdns:dnsdist:1.9.8
-
cpe:2.3:a:powerdns:dnsdist:1.9.9
-
cpe:2.3:a:powerdns:dnsdist:2.0.0
-
cpe:2.3:a:powerdns:dnsdist:2.0.1
-
cpe:2.3:a:powerdns:dnsdist:2.0.2