CVE-2023-50387

HIGH

Redhat Enterprise Linux < 2.90 - Resource Allocation Without Limits

Title source: rule
STIX 2.1

Description

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.

Exploits (3)

nomisec WORKING POC 44 stars
by knqyf263 · poc
https://github.com/knqyf263/CVE-2023-50387
nomisec WORKING POC
by Pablodiz · poc
https://github.com/Pablodiz/CVE-2023-50387
nomisec WORKING POC
by Meirelez · poc
https://github.com/Meirelez/SSR-DNSSEC

References (36)

Core 36
Core References
Third Party Advisory, VDB Entry
https://kb.isc.org/docs/cve-2023-50387

Scores

CVSS v3 7.5
EPSS 0.5199
EPSS Percentile 97.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-770
Status published
Products (17)
fedoraproject/fedora 39
isc/bind 9.0.0 - 9.16.46
microsoft/windows_server_2008 r2 sp1
microsoft/windows_server_2012
microsoft/windows_server_2012 r2
microsoft/windows_server_2016
microsoft/windows_server_2019
microsoft/windows_server_2022
microsoft/windows_server_2022_23h2
nic/knot_resolver < 5.71
... and 7 more
Published Feb 14, 2024
Tracked Since Feb 18, 2026