Updated: 2026-02-27 03:42:56.769809
Description:
The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | HIGH | 7.5 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| CentOS 7 ELS | dhcp | 4.2.5 | 7.5 | HIGH | Already Fixed | 2025-11-18 16:09:12 | ||
| CentOS 8.4 ELS | bind | 9.11.26 | 7.5 | HIGH | Released | CLSA-2024:1709550262 | 2024-03-04 08:42:17 | |
| CentOS 8.4 ELS | dhcp | 4.3.6-44 | 7.5 | HIGH | Not Vulnerable | 2024-10-11 10:45:34 | ||
| CentOS 8.5 ELS | dhcp | 4.3.6-45 | 7.5 | HIGH | Not Vulnerable | 2024-10-11 10:45:36 | ||
| CentOS 8.5 ELS | bind | 9.11.26 | 7.5 | HIGH | Released | CLSA-2024:1709561259 | 2024-03-04 10:08:50 | |
| CentOS Stream 8 ELS | dnsmasq | 2.79 | 7.5 | HIGH | Already Fixed | 2026-01-08 08:19:22 | ||
| CentOS Stream 8 ELS | bind | 9.11.36 | 7.5 | HIGH | Released | CLSA-2024:1730480495 | 2024-11-01 14:31:04 | |
| CentOS Stream 8 ELS | dhcp | 4.3.6 | 7.5 | HIGH | Not Vulnerable | 2024-10-11 10:45:36 | ||
| CentOS Stream 8 ELS | unbound | 1.16.2 | 7.5 | HIGH | Released | CLSA-2026:1768211704 | 2026-01-12 17:46:53 | |
| CloudLinux 6 ELS | dhcp | 4.1.1 | 7.5 | HIGH | Not Vulnerable | 2024-10-11 10:45:33 |