Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-50868

Опубликовано: 13 фев. 2024
Источник: redhat
CVSS3: 7.5
EPSS Средний

Описание

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.

A flaw was found in bind9. By flooding a DNSSEC resolver with responses coming from a DNSEC-signed zone using NSEC3, an attacker can lead the targeted resolver to a CPU exhaustion, further leading to a Denial of Service on the targeted host. This vulnerability applies only for systems where DNSSEC validation is enabled.

Отчет

The vulnerability in BIND9 that leads to CPU exhaustion through a flood of DNSSEC responses with NSEC3 signatures is a important severity issue due to its potential to induce a Denial of Service (DoS) condition on affected resolvers. By exploiting this flaw, an attacker can overwhelm a DNSSEC-enabled resolver with computationally intensive tasks, depleting CPU resources and disrupting normal DNS operations. This can result in significant service outages, affecting the resolver's ability to process legitimate DNS queries and thereby compromising network availability and reliability. The impact is exacerbated in high-traffic environments or where DNSSEC validation is extensively employed, making prompt remediation essential to prevent operational disruptions and maintain DNS infrastructure integrity.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7dnsmasqNot affected
Red Hat Enterprise Linux 9dhcpNot affected
Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSIONbindFixedRHSA-2025:003906.01.2025
Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSIONbind-dyndb-ldapFixedRHSA-2025:003906.01.2025
Red Hat Enterprise Linux 7bindFixedRHSA-2024:374110.06.2024
Red Hat Enterprise Linux 7bind-dyndb-ldapFixedRHSA-2024:374110.06.2024
Red Hat Enterprise Linux 7dhcpFixedRHSA-2024:374110.06.2024
Red Hat Enterprise Linux 7 Extended Lifecycle SupportunboundFixedRHSA-2024:1100312.12.2024
Red Hat Enterprise Linux 8unboundFixedRHSA-2024:096526.02.2024
Red Hat Enterprise Linux 8dnsmasqFixedRHSA-2024:133514.03.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=2263917bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources

EPSS

Процентиль: 98%
0.47857
Средний

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.

CVSS3: 7.5
nvd
больше 1 года назад

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.

CVSS3: 7.5
msrc
около 1 года назад

MITRE: CVE-2023-50868 NSEC3 closest encloser proof can exhaust CPU

CVSS3: 7.5
debian
больше 1 года назад

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 whe ...

CVSS3: 7.5
github
больше 1 года назад

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.

EPSS

Процентиль: 98%
0.47857
Средний

7.5 High

CVSS3