CVE-2023-50868

Severity
7.5HIGH
EPSS
11.8%
top 6.29%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14
Latest updateJan 15

Description

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages9 packages

NVDisc/bind9.0.09.16.48+4
NVDpowerdns/recursor4.9.04.9.3+2
Debianbind9< 1:9.16.48-1+3
Debiandnsmasq< 2.85-1+deb11u1+3
Debiansystemd< 247.3-7+deb11u6+3

Also affects: Debian Linux 10.0, 11.0, Fedora 38, 39, Enterprise Linux 6.0, 7.0, 8.0, 8.2, 8.4

🔴Vulnerability Details

9
OSV
dnsmasq vulnerabilities2024-04-24
OSV
bind9 vulnerabilities2024-04-09
OSV
unbound vulnerabilities2024-02-28
OSV
dnsmasq vulnerabilities2024-02-26
OSV
bind9 vulnerabilities2024-02-19

📋Vendor Advisories

13
Oracle
Oracle Oracle Communications Risk Matrix: Platform (BIND) — CVE-2023-508682025-01-15
Microsoft
MITRE: CVE-2023-50868 NSEC3 closest encloser proof can exhaust CPU2024-06-11
Ubuntu
Dnsmasq vulnerabilities2024-04-24
Ubuntu
Bind vulnerabilities2024-04-09
BSD
FreeBSD-SA-24:03.unbound: Multiple vulnerabilities in unbound2024-03-28