Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-50387

Опубликовано: 13 фев. 2024
Источник: redhat
CVSS3: 7.5

Описание

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.

Processing specially crafted responses coming from DNSSEC-signed zones can lead to uncontrolled CPU usage, leading to a Denial of Service in the DNSSEC-validating resolver side. This vulnerability applies only for systems where DNSSEC validation is enabled.

Отчет

This vulnerability in DNSSEC-validating resolvers is of important severity because it can lead to uncontrolled CPU consumption, resulting in a Denial of Service (DoS). By exploiting this flaw, attackers can send specially crafted DNS responses that cause the resolver to enter a state of excessive resource utilization. This can severely impact the availability and performance of DNS services, affecting not only the targeted resolver but potentially cascading to other dependent systems and services.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7dnsmasqNot affected
Red Hat Enterprise Linux 9dhcpNot affected
Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSIONbindFixedRHSA-2025:003906.01.2025
Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSIONbind-dyndb-ldapFixedRHSA-2025:003906.01.2025
Red Hat Enterprise Linux 7bindFixedRHSA-2024:374110.06.2024
Red Hat Enterprise Linux 7bind-dyndb-ldapFixedRHSA-2024:374110.06.2024
Red Hat Enterprise Linux 7dhcpFixedRHSA-2024:374110.06.2024
Red Hat Enterprise Linux 7 Extended Lifecycle SupportunboundFixedRHSA-2024:1100312.12.2024
Red Hat Enterprise Linux 8unboundFixedRHSA-2024:096526.02.2024
Red Hat Enterprise Linux 8dnsmasqFixedRHSA-2024:133514.03.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=2263914bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.

CVSS3: 7.5
nvd
больше 1 года назад

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.

msrc
больше 1 года назад

MITRE: CVE-2023-50387 DNSSEC verification complexity can be exploited to exhaust CPU resources and stall DNS resolvers

CVSS3: 7.5
debian
больше 1 года назад

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6 ...

CVSS3: 7.5
github
больше 1 года назад

Certain DNSSEC aspects of the DNS protocol (in RFC 4035 and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses when there is a zone with many DNSKEY and RRSIG records, aka the "KeyTrap" issue. The protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.

7.5 High

CVSS3