Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-50387


Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.


Published

2024-02-14T16:15:45.300

Last Modified

2025-05-12T15:15:56.673

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

Weaknesses
  • Type: Primary
    CWE-770
  • Type: Secondary
    CWE-770

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System redhat enterprise_linux 6.0 Yes
Operating System redhat enterprise_linux 7.0 Yes
Operating System redhat enterprise_linux 8.0 Yes
Operating System redhat enterprise_linux 9.0 Yes
Operating System microsoft windows_server_2008 r2 Yes
Operating System microsoft windows_server_2012 - Yes
Operating System microsoft windows_server_2012 r2 Yes
Operating System microsoft windows_server_2016 - Yes
Operating System microsoft windows_server_2019 - Yes
Operating System microsoft windows_server_2022 - Yes
Operating System microsoft windows_server_2022_23h2 - Yes
Operating System fedoraproject fedora 39 Yes
Application thekelleys dnsmasq < 2.90 Yes
Application nic knot_resolver < 5.71 Yes
Application powerdns recursor < 4.8.6 Yes
Application powerdns recursor < 4.9.3 Yes
Application powerdns recursor < 5.0.2 Yes
Application isc bind ≤ 9.16.46 Yes
Application isc bind ≤ 9.18.22 Yes
Application isc bind ≤ 9.19.20 Yes
Application nlnetlabs unbound < 1.19.1 Yes

References