CVE-2023-50868

HIGH

ISC Bind < 9.16.48 - Denial of Service

Title source: rule
STIX 2.1

Description

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.

Exploits (1)

nomisec WORKING POC 6 stars
by Goethe-Universitat-Cybersecurity · poc
https://github.com/Goethe-Universitat-Cybersecurity/NSEC3-Encloser-Attack

References (29)

Core 29
Core References
Exploit, Mitigation, Press/Media Coverage
https://www.isc.org/blogs/2024-bind-security-release/
Issue Tracking, Mailing List mailing-list
http://www.openwall.com/lists/oss-security/2024/02/16/2
Issue Tracking, Mailing List mailing-list
http://www.openwall.com/lists/oss-security/2024/02/16/3
Vendor Advisory, Mailing List mailing-list
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
Vendor Advisory, Mailing List mailing-list
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html

Scores

CVSS v3 7.5
EPSS 0.1180
EPSS Percentile 93.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-400
Status published
Products (16)
debian/debian_linux 10.0
debian/debian_linux 11.0
fedoraproject/fedora 38
fedoraproject/fedora 39
isc/bind 9.0.0 - 9.16.48
isc/bind 9.18.11 - 9.18.24
isc/bind 9.9.3 - 9.16.48
netapp/active_iq_unified_manager
netapp/bootstrap_os
netapp/hci_baseboard_management_controller
... and 6 more
Published Feb 14, 2024
Tracked Since Feb 18, 2026