CVE Vulnerabilities

CVE-2023-50868

Uncontrolled Resource Consumption

Published: Feb 14, 2024 | Modified: Dec 23, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the NSEC3 issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
BindIsc9.0.0 (including)9.16.48 (excluding)
BindIsc9.9.3 (including)9.16.48 (excluding)
BindIsc9.18.0 (including)9.18.24 (excluding)
BindIsc9.18.11 (including)9.18.24 (excluding)
BindIsc9.19.0 (including)9.19.21 (excluding)
Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSIONRedHatbind-32:9.8.2-0.68.rc1.el6_10.14*
Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSIONRedHatbind-dyndb-ldap-0:2.3-8.el6_10.1*
Red Hat Enterprise Linux 7RedHatbind-32:9.11.4-26.P2.el7_9.16*
Red Hat Enterprise Linux 7RedHatbind-dyndb-ldap-0:11.1-7.el7_9.1*
Red Hat Enterprise Linux 7RedHatdhcp-12:4.2.5-83.el7_9.2*
Red Hat Enterprise Linux 7 Extended Lifecycle SupportRedHatunbound-0:1.6.6-5.el7_9.1*
Red Hat Enterprise Linux 8RedHatunbound-0:1.16.2-5.el8_9.2*
Red Hat Enterprise Linux 8RedHatdnsmasq-0:2.79-31.el8_9.2*
Red Hat Enterprise Linux 8RedHatbind9.16-32:9.16.23-0.16.el8_9.2*
Red Hat Enterprise Linux 8RedHatbind-32:9.11.36-11.el8_9.1*
Red Hat Enterprise Linux 8RedHatbind-32:9.11.36-14.el8_10*
Red Hat Enterprise Linux 8RedHatbind-32:9.11.36-11.el8_9.1*
Red Hat Enterprise Linux 8RedHatbind-32:9.11.36-14.el8_10*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHatunbound-0:1.7.3-12.el8_2.1*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHatbind-32:9.11.13-6.el8_2.7*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHatdhcp-12:4.3.6-40.el8_2.3*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHatdnsmasq-0:2.79-11.el8_2.3*
Red Hat Enterprise Linux 8.2 Telecommunications Update ServiceRedHatunbound-0:1.7.3-12.el8_2.1*
Red Hat Enterprise Linux 8.2 Update Services for SAP SolutionsRedHatunbound-0:1.7.3-12.el8_2.1*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatunbound-0:1.7.3-15.el8_4.1*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatbind-32:9.11.26-4.el8_4.4*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatdhcp-12:4.3.6-44.el8_4.3*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatdnsmasq-0:2.79-15.el8_4.2*
Red Hat Enterprise Linux 8.4 Telecommunications Update ServiceRedHatunbound-0:1.7.3-15.el8_4.1*
Red Hat Enterprise Linux 8.4 Telecommunications Update ServiceRedHatbind-32:9.11.26-4.el8_4.4*
Red Hat Enterprise Linux 8.4 Telecommunications Update ServiceRedHatdhcp-12:4.3.6-44.el8_4.3*
Red Hat Enterprise Linux 8.4 Telecommunications Update ServiceRedHatdnsmasq-0:2.79-15.el8_4.2*
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRedHatunbound-0:1.7.3-15.el8_4.1*
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRedHatbind-32:9.11.26-4.el8_4.4*
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRedHatdhcp-12:4.3.6-44.el8_4.3*
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRedHatdnsmasq-0:2.79-15.el8_4.2*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatdnsmasq-0:2.79-21.el8_6.5*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatbind9.16-32:9.16.23-0.7.el8_6.5*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatunbound-0:1.7.3-17.el8_6.4*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatbind-32:9.11.36-3.el8_6.7*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatdhcp-12:4.3.6-47.el8_6.2*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatunbound-0:1.16.2-5.el8_8.1*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatdnsmasq-0:2.79-26.el8_8.4*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatbind9.16-32:9.16.23-0.14.el8_8.4*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatbind-32:9.11.36-8.el8_8.4*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatdhcp-12:4.3.6-49.el8_8.1*
Red Hat Enterprise Linux 9RedHatunbound-0:1.16.2-3.el9_3.1*
Red Hat Enterprise Linux 9RedHatdnsmasq-0:2.85-14.el9_3.1*
Red Hat Enterprise Linux 9RedHatbind-32:9.16.23-14.el9_3.4*
Red Hat Enterprise Linux 9RedHatbind-dyndb-ldap-0:11.9-8.el9_3.3*
Red Hat Enterprise Linux 9RedHatbind-32:9.16.23-18.el9_4.1*
Red Hat Enterprise Linux 9RedHatbind-dyndb-ldap-0:11.9-9.el9_4*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatdnsmasq-0:2.85-3.el9_0.1*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatbind-32:9.16.23-1.el9_0.5*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatbind-dyndb-ldap-0:11.9-7.el9_0.1*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatunbound-0:1.13.1-13.el9_0.4*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatunbound-0:1.16.2-3.el9_2.1*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatdnsmasq-0:2.85-6.el9_2.3*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatbind-32:9.16.23-11.el9_2.4*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatbind-dyndb-ldap-0:11.9-8.el9_2.2*
Bind9Ubuntubionic*
Bind9Ubuntudevel*
Bind9Ubuntuesm-infra-legacy/trusty*
Bind9Ubuntuesm-infra/bionic*
Bind9Ubuntuesm-infra/focal*
Bind9Ubuntuesm-infra/xenial*
Bind9Ubuntufocal*
Bind9Ubuntujammy*
Bind9Ubuntumantic*
Bind9Ubuntunoble*
Bind9Ubuntuoracular*
Bind9Ubuntuplucky*
Bind9Ubuntuquesting*
Bind9Ubuntutrusty*
Bind9Ubuntutrusty/esm*
Bind9Ubuntuupstream*
Bind9Ubuntuxenial*
Bind9-libsUbuntufocal*
DnsmasqUbuntubionic*
DnsmasqUbuntudevel*
DnsmasqUbuntuesm-infra-legacy/trusty*
DnsmasqUbuntuesm-infra/bionic*
DnsmasqUbuntuesm-infra/focal*
DnsmasqUbuntuesm-infra/xenial*
DnsmasqUbuntufocal*
DnsmasqUbuntujammy*
DnsmasqUbuntumantic*
DnsmasqUbuntunoble*
DnsmasqUbuntuoracular*
DnsmasqUbuntuplucky*
DnsmasqUbuntuquesting*
DnsmasqUbuntutrusty*
DnsmasqUbuntutrusty/esm*
DnsmasqUbuntuupstream*
DnsmasqUbuntuxenial*
Isc-dhcpUbuntumantic*
Isc-dhcpUbuntuoracular*
Isc-dhcpUbuntuplucky*
Knot-resolverUbuntubionic*
Knot-resolverUbuntufocal*
Knot-resolverUbuntumantic*
Knot-resolverUbuntuupstream*
Knot-resolverUbuntuxenial*
Pdns-recursorUbuntubionic*
Pdns-recursorUbuntufocal*
Pdns-recursorUbuntumantic*
Pdns-recursorUbuntutrusty*
Pdns-recursorUbuntuupstream*
Pdns-recursorUbuntuxenial*
UnboundUbuntubionic*
UnboundUbuntudevel*
UnboundUbuntuesm-infra/focal*
UnboundUbuntufocal*
UnboundUbuntujammy*
UnboundUbuntumantic*
UnboundUbuntunoble*
UnboundUbuntuoracular*
UnboundUbuntuplucky*
UnboundUbuntuquesting*
UnboundUbuntutrusty*
UnboundUbuntutrusty/esm*
UnboundUbuntuupstream*
UnboundUbuntuxenial*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References