Skip to content

The Closest Encloser Proof aspect of the DNS protocol (in...

Unreviewed Published Feb 14, 2024 to the GitHub Advisory Database • Updated Jun 10, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.

References

Published by the National Vulnerability Database Feb 14, 2024
Published to the GitHub Advisory Database Feb 14, 2024
Last updated Jun 10, 2024

Severity

Unknown

EPSS score

0.046%
(18th percentile)

Weaknesses

No CWEs

CVE ID

CVE-2023-50868

GHSA ID

GHSA-pv4h-p8jr-6cv2

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.