Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-50868

Опубликовано: 14 фев. 2024
Источник: ubuntu
Приоритет: medium
CVSS3: 7.5

Описание

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

released

1:9.18.24-0ubuntu1
esm-infra-legacy/trusty

not-affected

1:9.9.5.dfsg-3ubuntu0.19+esm12
esm-infra/bionic

released

1:9.11.3+dfsg-1ubuntu1.19+esm3
esm-infra/focal

not-affected

1:9.16.48-0ubuntu0.20.04.1
esm-infra/xenial

released

1:9.10.3.dfsg.P4-8ubuntu1.19+esm8
focal

released

1:9.16.48-0ubuntu0.20.04.1
jammy

released

1:9.18.18-0ubuntu0.22.04.2
mantic

released

1:9.18.18-0ubuntu2.1
noble

released

1:9.18.24-0ubuntu1

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra/focal

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

mantic

DNE

noble

DNE

oracular

DNE

plucky

DNE

trusty

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

released

2.90-1
esm-infra-legacy/trusty

needs-triage

esm-infra/bionic

released

2.90-0ubuntu0.18.04.1+esm1
esm-infra/focal

not-affected

2.90-0ubuntu0.20.04.1
esm-infra/xenial

released

2.90-0ubuntu0.16.04.1+esm1
focal

released

2.90-0ubuntu0.20.04.1
jammy

released

2.90-0ubuntu0.22.04.1
mantic

released

2.90-0ubuntu0.23.10.1
noble

released

2.90-1

Показывать по

РелизСтатусПримечание
bionic

not-affected

code not present
devel

needs-triage

esm-apps/noble

needs-triage

esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

needs-triage

esm-infra/focal

not-affected

code not present
esm-infra/xenial

not-affected

code not present
focal

not-affected

code not present
jammy

not-affected

code not present
mantic

ignored

end of life, was needs-triage

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

not-affected

5.7.1-1
esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

not-affected

5.7.1-1
esm-apps/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

mantic

ignored

end of life, was needs-triage

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

not-affected

4.9.3-1
esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

not-affected

4.9.3-1
esm-apps/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

mantic

ignored

end of life, was needs-triage

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

released

1.19.1-1ubuntu1
esm-infra-legacy/trusty

needs-triage

esm-infra/bionic

needs-triage

esm-infra/focal

not-affected

1.9.4-2ubuntu1.5
esm-infra/xenial

needs-triage

focal

released

1.9.4-2ubuntu1.5
jammy

released

1.13.1-1ubuntu5.4
mantic

released

1.17.1-2ubuntu0.1
noble

released

1.19.1-1ubuntu1

Показывать по

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 1 года назад

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.

CVSS3: 7.5
nvd
больше 1 года назад

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.

CVSS3: 7.5
msrc
около 1 года назад

MITRE: CVE-2023-50868 NSEC3 closest encloser proof can exhaust CPU

CVSS3: 7.5
debian
больше 1 года назад

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 whe ...

CVSS3: 7.5
github
больше 1 года назад

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.

7.5 High

CVSS3

Уязвимость CVE-2023-50868