CVE-2023-50868

Source
https://cve.org/CVERecord?id=CVE-2023-50868
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-50868.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-50868
Downstream
Related
Published
2024-02-14T16:15:45.377Z
Modified
2026-02-22T07:46:39.477288Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.

References

Affected packages

Git / gitlab.isc.org/isc-projects/bind9

Affected versions

v9.*
v9.18.11
v9.18.12
v9.18.13
v9.18.14
v9.18.15
v9.18.16
v9.18.17
v9.18.18
v9.18.19
v9.18.20
v9.18.21
v9.19.0
v9.19.1
v9.19.10
v9.19.11
v9.19.12
v9.19.13
v9.19.14
v9.19.15
v9.19.16
v9.19.17
v9.19.18
v9.19.19
v9.19.2
v9.19.3
v9.19.4
v9.19.5
v9.19.6
v9.19.7
v9.19.8
v9.19.9

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-50868.json"