CVE-2023-50868
14.02.2024, 16:15
The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.Enginsight
Awaiting analysis
This vulnerability is currently awaiting analysis.

Debian Releases
Debian Product | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
bind9 |
| ||||||||||||||
dnsjava |
| ||||||||||||||
dnsmasq |
| ||||||||||||||
knot-resolver |
| ||||||||||||||
pdns-recursor |
| ||||||||||||||
systemd |
| ||||||||||||||
unbound |
|

Ubuntu Releases
Ubuntu Product | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
bind9 |
| ||||||||||||||||
bind9-libs |
| ||||||||||||||||
dnsmasq |
| ||||||||||||||||
isc-dhcp |
| ||||||||||||||||
knot-resolver |
| ||||||||||||||||
pdns-recursor |
| ||||||||||||||||
unbound |
|
References