Multiple CoreDNS server implementations (gRPC, HTTPS, and HTTP/3) lack critical resource-limiting controls. An unauthenticated remote attacker can exhaust memory and degrade or crash the server by opening many concurrent connections, streams, or sending oversized request bodies. The issue is similar in nature to CVE-2025-47950 (QUIC DoS) but affects additional server types that do not enforce connection limits, stream limits, or message size constraints.
The affected servers do not enforce reasonable upper bounds on concurrent connections or active streams. An attacker can:
Testing demonstrates that modest resource configurations (e.g., 256 MB RAM) can be exhausted quickly. Increasing concurrency parameters in the PoCs allows attackers to scale the impact.
The gRPC server accepts arbitrarily large protobuf messages (default limit ~4 MB per request) without validating against DNS protocol constraints (maximum 64 KB). Sending multiple concurrent oversized messages can quickly exhaust available memory.
This vulnerability mirrors earlier hardening work in PR https://github.com/coredns/coredns/pull/7490, which applied checks for upstream proxying but left server-side request validation unprotected.
In all cases, remote unauthenticated attackers can reliably trigger memory exhaustion and cause a denial of service.
v1.14.0
{
"github_reviewed": true,
"github_reviewed_at": "2026-01-08T20:12:58Z",
"severity": "MODERATE",
"nvd_published_at": "2026-01-08T16:15:59Z",
"cwe_ids": [
"CWE-770"
]
}