Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-50868


The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.


Published

2024-02-14T16:15:45.377

Last Modified

2025-12-23T20:20:08.930

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-400

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application isc bind < 9.16.48 Yes
Application isc bind < 9.16.48 Yes
Application isc bind < 9.18.24 Yes
Application isc bind < 9.18.24 Yes
Application isc bind < 9.19.21 Yes
Operating System fedoraproject fedora 38 Yes
Operating System fedoraproject fedora 39 Yes
Operating System debian debian_linux 10.0 Yes
Operating System debian debian_linux 11.0 Yes
Operating System redhat enterprise_linux 6.0 Yes
Operating System redhat enterprise_linux 7.0 Yes
Operating System redhat enterprise_linux 8.0 Yes
Operating System redhat enterprise_linux 8.2 Yes
Operating System redhat enterprise_linux 8.4 Yes
Application powerdns recursor < 4.8.5 Yes
Application powerdns recursor < 4.9.3 Yes
Application powerdns recursor < 5.0.2 Yes
Operating System netapp bootstrap_os - Yes
Hardware netapp hci_compute_node - No
Application netapp active_iq_unified_manager - Yes
Application netapp hci_baseboard_management_controller - Yes
Hardware netapp h300s - No
Hardware netapp h410c - No
Hardware netapp h410s - No
Hardware netapp h500s - No
Hardware netapp h700s - No

References