The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.
{
"cna_assigner": "mitre",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/50xxx/CVE-2023-50868.json"
}{
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "6.0"
},
{
"last_affected": "8.0"
}
],
"cpe": [
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
]
}{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "4.8.5"
},
{
"introduced": "4.9.0"
},
{
"fixed": "4.9.3"
},
{
"introduced": "5.0.0"
},
{
"fixed": "5.0.2"
}
]
}{
"source": "CPE_FIELD",
"cpe": [
"cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*",
"cpe:2.3:a:isc:bind:*:*:*:*:supported_preview:*:*:*",
"cpe:2.3:a:isc:bind:*:s1:*:*:supported_preview:*:*:*"
],
"extracted_events": [
{
"introduced": "9.0.0"
},
{
"fixed": "9.16.48"
},
{
"introduced": "9.9.3"
},
{
"fixed": "9.16.48"
},
{
"introduced": "9.18.0"
},
{
"fixed": "9.18.24"
},
{
"introduced": "9.18.11"
},
{
"fixed": "9.18.24"
},
{
"introduced": "9.19.0"
},
{
"fixed": "9.19.21"
}
]
}