The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
| AND |
|
Configuration 7 (hide)
|
Configuration 8 (hide)
| AND |
|
History
No history.
Information
Published : 2024-02-14 16:15
Updated : 2025-12-23 20:20
NVD link : CVE-2023-50868
Mitre link : CVE-2023-50868
CVE.ORG link : CVE-2023-50868
JSON object : View
Products Affected
netapp
- hci_compute_node
- h500s
- hci_baseboard_management_controller
- active_iq_unified_manager
- h410s
- bootstrap_os
- h410c
- h300s
- h700s
debian
- debian_linux
isc
- bind
redhat
- enterprise_linux
fedoraproject
- fedora
powerdns
- recursor
CWE
CWE-400
Uncontrolled Resource Consumption
