CVE-2026-33595
Received Received - Intake
Excessive Memory Allocation in DoQ/DoH3 via Error Response Flooding

Publication date: 2026-04-22

Last updated on: 2026-04-24

Assigner: Open-Xchange

Description
A client can trigger excessive memory allocation by generating a lot of errors responses over a single DoQ and DoH3 connection, as some resources were not properly released until the end of the connection.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-22
Last Modified
2026-04-24
Generated
2026-05-07
AI Q&A
2026-04-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
powerdns dnsdist From 1.9.0 (inc) to 1.9.13 (exc)
powerdns dnsdist From 2.0.0 (inc) to 2.0.4 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-770 The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs when a client triggers excessive memory allocation by generating many error responses over a single DoQ (DNS over QUIC) and DoH3 (DNS over HTTPS version 3) connection. The issue arises because some resources are not properly released until the connection ends, leading to increased memory usage.


How can this vulnerability impact me? :

The vulnerability can lead to excessive memory consumption on the affected system, potentially causing performance degradation or denial of service due to resource exhaustion.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart