CVE-2023-50868

Updated: 2026-02-27 03:42:56.769809

Description:

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

CentOS 7 ELS dhcp 4.2.5 7.5 HIGH Already Fixed 2025-11-18 16:09:12
CentOS 8.4 ELS bind 9.11.26 7.5 HIGH Released CLSA-2024:1709550262 2024-03-04 08:42:17
CentOS 8.4 ELS dhcp 4.3.6-44 7.5 HIGH Not Vulnerable 2024-10-11 10:45:34
CentOS 8.5 ELS dhcp 4.3.6-45 7.5 HIGH Not Vulnerable 2024-10-11 10:45:36
CentOS 8.5 ELS bind 9.11.26 7.5 HIGH Released CLSA-2024:1709561259 2024-03-04 10:08:50
CentOS Stream 8 ELS dnsmasq 2.79 7.5 HIGH Already Fixed 2026-01-08 08:19:22
CentOS Stream 8 ELS bind 9.11.36 7.5 HIGH Released CLSA-2024:1730480495 2024-11-01 14:31:04
CentOS Stream 8 ELS dhcp 4.3.6 7.5 HIGH Not Vulnerable 2024-10-11 10:45:36
CentOS Stream 8 ELS unbound 1.16.2 7.5 HIGH Released CLSA-2026:1768211704 2026-01-12 17:46:53
CloudLinux 6 ELS dhcp 4.1.1 7.5 HIGH Not Vulnerable 2024-10-11 10:45:33
Total: 37