CVE-2023-50868

Updated: 2026-02-27 03:42:56.769809

Description:

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU bind-dyndb-ldap 11.9 7.5 HIGH Not Vulnerable 2025-12-05 21:56:58
AlmaLinux 9.2 ESU dnsmasq 2.85 7.5 HIGH Released CLSA-2025:1745269163 2025-04-23 03:53:37
AlmaLinux 9.2 ESU bind 9.16.23 7.5 HIGH Released CLSA-2024:1709547568 2024-03-04 08:42:16
AlmaLinux 9.2 ESU unbound 1.16.2 7.5 HIGH Released CLSA-2024:1734532058 2024-12-18 22:57:02
AlmaLinux 9.2 ESU dhcp 4.4.2 7.5 HIGH Not Vulnerable 2025-02-27 22:10:21
CentOS 6 ELS bind 9.8.2 7.5 HIGH Released CLSA-2024:1710437162 2024-03-25 09:51:17
CentOS 6 ELS dhcp 4.1.1 7.5 HIGH Not Vulnerable 2024-10-11 10:45:34
CentOS 7 ELS unbound 1.6.6 7.5 HIGH Released CLSA-2024:1729513208 2024-11-01 10:57:17
CentOS 7 ELS dnsmasq 2.76 7.5 HIGH Already Fixed 2024-10-02 14:26:03
CentOS 7 ELS bind 9.11.4 7.5 HIGH Released CLSA-2024:1709550046 2024-03-15 14:09:27
Total: 37