CVE-2023-50868

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.
References
Link Resource
http://www.openwall.com/lists/oss-security/2024/02/16/2 Issue Tracking Mailing List
http://www.openwall.com/lists/oss-security/2024/02/16/3 Issue Tracking Mailing List
https://access.redhat.com/security/cve/CVE-2023-50868 Vendor Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1219826 Issue Tracking
https://datatracker.ietf.org/doc/html/rfc5155 Technical Description
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html Vendor Advisory
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1 Release Notes
https://kb.isc.org/docs/cve-2023-50868 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html Vendor Advisory Mailing List
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/ Vendor Advisory Mailing List
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html Mailing List Release Notes
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/ Release Notes
https://security.netapp.com/advisory/ntap-20240307-0008/ Vendor Advisory
https://www.isc.org/blogs/2024-bind-security-release/ Exploit Mitigation Press/Media Coverage
http://www.openwall.com/lists/oss-security/2024/02/16/2 Issue Tracking Mailing List
http://www.openwall.com/lists/oss-security/2024/02/16/3 Issue Tracking Mailing List
https://access.redhat.com/security/cve/CVE-2023-50868 Vendor Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1219826 Issue Tracking
https://datatracker.ietf.org/doc/html/rfc5155 Technical Description
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html Vendor Advisory
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1 Release Notes
https://kb.isc.org/docs/cve-2023-50868 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html Vendor Advisory Mailing List
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html Vendor Advisory Mailing List
https://lists.debian.org/debian-lts-announce/2024/09/msg00001.html Vendor Advisory Mailing List
https://lists.debian.org/debian-lts-announce/2024/11/msg00035.html Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/ Vendor Advisory Mailing List
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/ Vendor Advisory Mailing List
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html Mailing List Release Notes
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/ Release Notes
https://security.netapp.com/advisory/ntap-20240307-0008/ Vendor Advisory
https://www.isc.org/blogs/2024-bind-security-release/ Exploit Mitigation Press/Media Coverage
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*
cpe:2.3:a:isc:bind:*:*:*:*:supported_preview:*:*:*
cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*
cpe:2.3:a:isc:bind:*:s1:*:*:supported_preview:*:*:*
cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.4:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*

Configuration 7 (hide)

cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*

Configuration 8 (hide)

AND
cpe:2.3:a:netapp:hci_baseboard_management_controller:-:*:*:*:*:*:*:*
OR cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-02-14 16:15

Updated : 2025-12-23 20:20


NVD link : CVE-2023-50868

Mitre link : CVE-2023-50868

CVE.ORG link : CVE-2023-50868


JSON object : View

Products Affected

netapp

  • hci_compute_node
  • h500s
  • hci_baseboard_management_controller
  • active_iq_unified_manager
  • h410s
  • bootstrap_os
  • h410c
  • h300s
  • h700s

debian

  • debian_linux

isc

  • bind

redhat

  • enterprise_linux

fedoraproject

  • fedora

powerdns

  • recursor
CWE
CWE-400

Uncontrolled Resource Consumption