7.5

CVE-2023-50868

Medienbericht
Exploit
The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
IscBind SwEdition- Version >= 9.0.0 < 9.16.48
IscBind SwEditionsupported_preview Version >= 9.9.3 < 9.16.48
IscBind SwEdition- Version >= 9.18.0 < 9.18.24
IscBind Updates1 SwEditionsupported_preview Version >= 9.18.11 < 9.18.24
IscBind SwEdition- Version >= 9.19.0 < 9.19.21
FedoraprojectFedora Version38
FedoraprojectFedora Version39
DebianDebian Linux Version10.0
DebianDebian Linux Version11.0
RedhatEnterprise Linux Version6.0
RedhatEnterprise Linux Version7.0
RedhatEnterprise Linux Version8.0
RedhatEnterprise Linux Version8.2
RedhatEnterprise Linux Version8.4
PowerdnsRecursor Version < 4.8.5
PowerdnsRecursor Version >= 4.9.0 < 4.9.3
PowerdnsRecursor Version >= 5.0.0 < 5.0.2
NetappBootstrap Os Version-
   NetappHci Compute Node Version-
NetappActive Iq Unified Manager Version- SwPlatformvmware_vsphere
NetappHci Baseboard Management Controller Version-
   NetappH300s Version-
   NetappH410c Version-
   NetappH410s Version-
   NetappH500s Version-
   NetappH700s Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 43.88% 0.974
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

https://www.isc.org/blogs/2024-bind-security-release/
Exploit
Mitigation
Press/Media Coverage