7.5

CVE-2023-50387

Media report

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.

Data is provided by the National Vulnerability Database (NVD)
RedhatEnterprise Linux Version6.0
RedhatEnterprise Linux Version7.0
RedhatEnterprise Linux Version8.0
RedhatEnterprise Linux Version9.0
MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
FedoraprojectFedora Version39
ThekelleysDnsmasq Version < 2.90
NicKnot Resolver Version < 5.71
PowerdnsRecursor Version >= 4.8.0 < 4.8.6
PowerdnsRecursor Version >= 4.9.0 < 4.9.3
PowerdnsRecursor Version >= 5.0.0 < 5.0.2
IscBind SwEdition- Version >= 9.0.0 <= 9.16.46
IscBind SwEdition- Version >= 9.18.0 <= 9.18.22
IscBind SwEdition- Version >= 9.19.0 <= 9.19.20
NlnetlabsUnbound Version < 1.19.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 42.22% 0.974
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-770 Allocation of Resources Without Limits or Throttling

The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.

https://kb.isc.org/docs/cve-2023-50387
Third Party Advisory
VDB Entry