CVE-2023-50868

EUVD-2023-55601
The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA-ADPADP
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 93%
Affected Products (NVD)
VendorProductVersion
iscbind
9.0.0 ≤
𝑥
< 9.16.48
iscbind
9.9.3 ≤
𝑥
< 9.16.48
iscbind
9.18.0 ≤
𝑥
< 9.18.24
iscbind
9.18.11 ≤
𝑥
< 9.18.24
iscbind
9.19.0 ≤
𝑥
< 9.19.21
debiandebian_linux
10.0
debiandebian_linux
11.0
redhatenterprise_linux
6.0
redhatenterprise_linux
7.0
redhatenterprise_linux
8.0
redhatenterprise_linux
8.2
redhatenterprise_linux
8.4
powerdnsrecursor
𝑥
< 4.8.5
powerdnsrecursor
4.9.0 ≤
𝑥
< 4.9.3
powerdnsrecursor
5.0.0 ≤
𝑥
< 5.0.2
netappbootstrap_os
-
netappactive_iq_unified_manager
-
netapphci_baseboard_management_controller
-
𝑥
= Vulnerable software versions
Windows Releases
Platform
Version
Windows Server 2012
Server Core
Standard
Windows Server 2012 R2
Server Core
Standard
Windows Server 2016
Server Core
Standard
Windows Server 2019
Server Core
Standard
Windows Server 2022
23H2 Server Core
Server Core
Standard
Debian logo
Debian Releases
Debian Product
Codename
bind9
bookworm
1:9.18.28-1~deb12u2
no-dsa
bookworm (security)
1:9.18.28-1~deb12u2
fixed
bullseye
1:9.16.50-1~deb11u2
no-dsa
bullseye (security)
1:9.16.50-1~deb11u1
fixed
buster
no-dsa
sid
1:9.20.4-3
fixed
trixie
1:9.20.4-3
fixed
dnsjava
bookworm
no-dsa
bullseye
no-dsa
buster
no-dsa
sid
vulnerable
dnsmasq
bookworm
no-dsa
bullseye
no-dsa
bullseye (security)
2.85-1+deb11u1
fixed
buster
no-dsa
sid
2.90-7
fixed
trixie
2.90-7
fixed
knot-resolver
bookworm
5.6.0-1+deb12u1
no-dsa
bookworm (security)
5.6.0-1+deb12u1
fixed
bullseye
no-dsa
buster
no-dsa
sid
5.7.4-2
fixed
trixie
5.7.4-2
fixed
pdns-recursor
bookworm
4.8.8-1
no-dsa
bookworm (security)
4.8.8-1
fixed
bullseye
no-dsa
buster
no-dsa
sid
5.1.3-1
fixed
trixie
5.1.3-1
fixed
systemd
bookworm
252.31-1~deb12u1
no-dsa
bullseye
no-dsa
bullseye (security)
247.3-7+deb11u6
fixed
buster
no-dsa
sid
257.1-5
fixed
trixie
257.1-4
fixed
unbound
bookworm
1.17.1-2+deb12u2
no-dsa
bookworm (security)
1.17.1-2+deb12u2
fixed
bullseye
1.13.1-1+deb11u2
no-dsa
bullseye (security)
1.13.1-1+deb11u4
fixed
buster
no-dsa
sid
1.22.0-1
fixed
trixie
1.22.0-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
bind9
bionic
Fixed 1:9.11.3+dfsg-1ubuntu1.19+esm3
released
focal
Fixed 1:9.16.48-0ubuntu0.20.04.1
released
jammy
Fixed 1:9.18.18-0ubuntu0.22.04.2
released
mantic
Fixed 1:9.18.18-0ubuntu2.1
released
noble
Fixed 1:9.18.24-0ubuntu1
released
oracular
Fixed 1:9.18.24-0ubuntu1
released
trusty
Fixed 1:9.9.5.dfsg-3ubuntu0.19+esm12
released
xenial
Fixed 1:9.10.3.dfsg.P4-8ubuntu1.19+esm8
released
bind9-libs
bionic
dne
focal
needs-triage
jammy
needs-triage
mantic
dne
noble
dne
oracular
dne
trusty
dne
xenial
dne
dnsmasq
bionic
Fixed 2.90-0ubuntu0.18.04.1+esm1
released
focal
Fixed 2.90-0ubuntu0.20.04.1
released
jammy
Fixed 2.90-0ubuntu0.22.04.1
released
mantic
Fixed 2.90-0ubuntu0.23.10.1
released
noble
Fixed 2.90-1
released
oracular
Fixed 2.90-1
released
trusty
ignored
xenial
Fixed 2.90-0ubuntu0.16.04.1+esm1
released
isc-dhcp
bionic
needs-triage
focal
not-affected
jammy
not-affected
mantic
ignored
noble
needs-triage
oracular
needs-triage
trusty
not-affected
xenial
not-affected
knot-resolver
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
mantic
ignored
noble
pending
oracular
not-affected
trusty
dne
xenial
needs-triage
pdns-recursor
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
mantic
ignored
noble
pending
oracular
not-affected
trusty
ignored
xenial
needs-triage
unbound
bionic
needs-triage
focal
Fixed 1.9.4-2ubuntu1.5
released
jammy
Fixed 1.13.1-1ubuntu5.4
released
mantic
Fixed 1.17.1-2ubuntu0.1
released
noble
Fixed 1.19.1-1ubuntu1
released
oracular
Fixed 1.19.1-1ubuntu1
released
trusty
ignored
xenial
needs-triage
References