Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.
2024-02-14T16:15:45.300
2025-05-12T15:15:56.673
Modified
CVSSv3.1: 7.5 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | redhat | enterprise_linux | 6.0 | Yes |
Operating System | redhat | enterprise_linux | 7.0 | Yes |
Operating System | redhat | enterprise_linux | 8.0 | Yes |
Operating System | redhat | enterprise_linux | 9.0 | Yes |
Operating System | microsoft | windows_server_2008 | r2 | Yes |
Operating System | microsoft | windows_server_2012 | - | Yes |
Operating System | microsoft | windows_server_2012 | r2 | Yes |
Operating System | microsoft | windows_server_2016 | - | Yes |
Operating System | microsoft | windows_server_2019 | - | Yes |
Operating System | microsoft | windows_server_2022 | - | Yes |
Operating System | microsoft | windows_server_2022_23h2 | - | Yes |
Operating System | fedoraproject | fedora | 39 | Yes |
Application | thekelleys | dnsmasq | < 2.90 | Yes |
Application | nic | knot_resolver | < 5.71 | Yes |
Application | powerdns | recursor | < 4.8.6 | Yes |
Application | powerdns | recursor | < 4.9.3 | Yes |
Application | powerdns | recursor | < 5.0.2 | Yes |
Application | isc | bind | ≤ 9.16.46 | Yes |
Application | isc | bind | ≤ 9.18.22 | Yes |
Application | isc | bind | ≤ 9.19.20 | Yes |
Application | nlnetlabs | unbound | < 1.19.1 | Yes |