CVE-2023-50868

Updated: 2024-09-27 10:55:24.456237

Description:

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x NONE 0
CVSS Version 3.x HIGH 7.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU bind 9.16.23 7.5 HIGH Released CLSA-2024:1709547568 2024-03-04 08:42:16
AlmaLinux 9.2 ESU dhcp 4.4.2 7.5 HIGH Not Vulnerable 2024-10-11 10:45:37
CentOS 6 ELS bind 9.8.2 7.5 HIGH Released CLSA-2024:1710437162 2024-03-25 09:51:17
CentOS 6 ELS dhcp 4.1.1 7.5 HIGH Not Vulnerable 2024-10-11 10:45:34
CentOS 7 ELS bind 9.11.4 7.5 HIGH Released CLSA-2024:1709550046 2024-03-15 14:09:27
CentOS 7 ELS unbound 1.6.6 7.5 HIGH Released CLSA-2024:1729513208 2024-11-01 10:57:17
CentOS 7 ELS dhcp 4.2.5 7.5 HIGH Not Vulnerable 2024-10-09 14:26:52
CentOS 7 ELS dnsmasq 2.76 7.5 HIGH Already Fixed 2024-10-02 14:26:03
CentOS 8.4 ELS bind 9.11.26 7.5 HIGH Released CLSA-2024:1709550262 2024-03-04 08:42:17
CentOS 8.4 ELS dhcp 4.3.6-44 7.5 HIGH Not Vulnerable 2024-10-11 10:45:34
Total: 24