Vulnerability CVE-2023-50868: Information

Description

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.

Published: Feb. 14, 2024
Modified: March 7, 2024

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
unboundsisyphus1.19.1-alt11.20.0-alt1ALT-PU-2024-2451-1340809Fixed
unboundsisyphus_e2k1.19.1-alt11.20.0-alt1ALT-PU-2024-2533-1-Fixed
unboundsisyphus_riscv641.19.1-alt11.20.0-alt1ALT-PU-2024-3536-1-Fixed
unboundsisyphus_loongarch641.19.1-alt11.20.0-alt1ALT-PU-2024-2503-1-Fixed
unboundp101.19.1-alt11.20.0-alt1ALT-PU-2024-2453-2340810Fixed
unboundp10_e2k1.19.1-alt11.20.0-alt1ALT-PU-2024-2787-1-Fixed
unboundp91.19.1-alt11.20.0-alt1ALT-PU-2024-2605-2340811Fixed
unboundc10f11.19.1-alt11.20.0-alt1ALT-PU-2024-2607-2340813Fixed
unboundc9f21.19.1-alt11.20.0-alt1ALT-PU-2024-2455-2340812Fixed

References to Advisories, Solutions, and Tools