The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "6.0"
},
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
}{
"versions": [
{
"introduced": "0"
},
{
"fixed": "4.8.5"
},
{
"introduced": "4.9.0"
},
{
"fixed": "4.9.3"
},
{
"introduced": "5.0.0"
},
{
"fixed": "5.0.2"
}
]
}{
"versions": [
{
"introduced": "9.0.0"
},
{
"fixed": "9.16.48"
},
{
"introduced": "9.9.3"
},
{
"fixed": "9.16.48"
},
{
"introduced": "9.18.0"
},
{
"fixed": "9.18.24"
},
{
"introduced": "9.18.11"
},
{
"fixed": "9.18.24"
},
{
"introduced": "9.19.0"
},
{
"fixed": "9.19.21"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "38"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "39"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "11.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.4"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-50868.json"