CVE-2023-50868

Source
https://cve.org/CVERecord?id=CVE-2023-50868
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-50868.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-50868
Downstream
Related
Published
2024-02-14T16:15:45.377Z
Modified
2026-02-24T11:51:03.325428Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.

References

Affected packages

Git / github.com/smarty-php/smarty

Affected ranges

Type
GIT
Repo
https://github.com/smarty-php/smarty
Events

Affected versions

v5.*
v5.0.0
v5.0.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-50868.json"

Git / gitlab.isc.org/isc-projects/bind9

Affected versions

v9.*
v9.18.11
v9.18.12
v9.18.13
v9.18.14
v9.18.15
v9.18.16
v9.18.17
v9.18.18
v9.18.19
v9.18.20
v9.18.21
v9.19.0
v9.19.1
v9.19.10
v9.19.11
v9.19.12
v9.19.13
v9.19.14
v9.19.15
v9.19.16
v9.19.17
v9.19.18
v9.19.19
v9.19.2
v9.19.3
v9.19.4
v9.19.5
v9.19.6
v9.19.7
v9.19.8
v9.19.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-50868.json"