2024-02-14 17:08:46 +00:00
{
"id" : "CVE-2023-50387" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2024-02-14T16:15:45.300" ,
2024-03-07 19:03:27 +00:00
"lastModified" : "2024-03-07T17:15:11.587" ,
2024-02-21 15:04:29 +00:00
"vulnStatus" : "Modified" ,
2024-02-14 17:08:46 +00:00
"descriptions" : [
{
"lang" : "en" ,
2024-02-15 21:00:30 +00:00
"value" : "Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the \"KeyTrap\" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records."
} ,
{
"lang" : "es" ,
"value" : "Ciertos aspectos DNSSEC del protocolo DNS (en RFC 4035 y RFC relacionados) permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU) a trav\u00e9s de una o m\u00e1s respuestas DNSSEC cuando hay una zona con muchos registros DNSKEY y RRSIG, tambi\u00e9n conocido como \"KeyTrap\". \" asunto. La especificaci\u00f3n del protocolo implica que un algoritmo debe evaluar todas las combinaciones de registros DNSKEY y RRSIG."
2024-02-14 17:08:46 +00:00
}
] ,
2024-02-20 17:16:47 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-770"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F4CFF558-3C47-480D-A2F0-BABF26042943"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*" ,
"matchCriteriaId" : "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DB18C4CE-5917-401E-ACF7-2747084FD36E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DB79EE26-FC32-417D-A49C-A1A63165A968"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "75CCACE6-A0EE-4A6F-BD5A-7AA504B02717"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.90" ,
"matchCriteriaId" : "964796B3-BA45-4180-A8DA-64CF93CED122"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nic:knot_resolver:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "5.71" ,
"matchCriteriaId" : "8A8328E8-C652-4262-8C00-D89AD8F75CCF"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.8.0" ,
"versionEndExcluding" : "4.8.6" ,
"matchCriteriaId" : "5207D316-7DC9-4724-BC48-C8D3EC5087E8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.9.0" ,
"versionEndExcluding" : "4.9.3" ,
"matchCriteriaId" : "FEE64451-7CB9-45BD-8168-9F48199A9363"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.0.0" ,
"versionEndExcluding" : "5.0.2" ,
"matchCriteriaId" : "0526B76D-52BB-4FA1-B692-8EDEC673EAE5"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*" ,
"versionStartIncluding" : "9.0.0" ,
"versionEndIncluding" : "9.16.46" ,
"matchCriteriaId" : "F3814976-5223-4615-BA7B-E33083D3EC26"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*" ,
"versionStartIncluding" : "9.18.0" ,
"versionEndIncluding" : "9.18.22" ,
"matchCriteriaId" : "140CCABA-F134-4CC2-9960-258D6BFF34DD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*" ,
"versionStartIncluding" : "9.19.0" ,
"versionEndIncluding" : "9.19.20" ,
"matchCriteriaId" : "71BAD5BF-8532-4988-A772-6CD7B851E9E2"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.19.1" ,
"matchCriteriaId" : "8C094EEB-BAD6-495B-B1CB-671D31549F15"
}
]
}
]
}
] ,
2024-02-14 17:08:46 +00:00
"references" : [
2024-02-16 21:00:28 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2024/02/16/2" ,
2024-02-20 17:16:47 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List"
]
2024-02-16 21:00:28 +00:00
} ,
2024-02-16 23:00:28 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2024/02/16/3" ,
2024-02-20 17:16:47 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List"
]
2024-02-16 23:00:28 +00:00
} ,
2024-02-15 03:00:29 +00:00
{
"url" : "https://access.redhat.com/security/cve/CVE-2023-50387" ,
2024-02-20 17:16:47 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2024-02-15 03:00:29 +00:00
} ,
{
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=1219823" ,
2024-02-20 17:16:47 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking"
]
2024-02-15 03:00:29 +00:00
} ,
2024-02-14 17:08:46 +00:00
{
"url" : "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html" ,
2024-02-20 17:16:47 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2024-02-14 17:08:46 +00:00
} ,
2024-02-15 00:55:29 +00:00
{
"url" : "https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1" ,
2024-02-20 17:16:47 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
2024-02-15 00:55:29 +00:00
} ,
2024-02-14 17:08:46 +00:00
{
"url" : "https://kb.isc.org/docs/cve-2023-50387" ,
2024-02-20 17:16:47 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
2024-02-14 17:08:46 +00:00
} ,
2024-02-21 15:04:29 +00:00
{
"url" : "https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html" ,
"source" : "cve@mitre.org"
} ,
2024-02-29 05:00:35 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/" ,
"source" : "cve@mitre.org"
} ,
2024-02-19 05:00:27 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/" ,
2024-02-20 17:16:47 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List"
]
2024-02-19 05:00:27 +00:00
} ,
2024-02-26 17:04:33 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/" ,
"source" : "cve@mitre.org"
} ,
2024-02-29 05:00:35 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/" ,
"source" : "cve@mitre.org"
} ,
2024-02-19 05:00:27 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/" ,
2024-02-20 17:16:47 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List"
]
2024-02-19 05:00:27 +00:00
} ,
2024-02-26 17:04:33 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/" ,
"source" : "cve@mitre.org"
} ,
2024-02-18 03:00:28 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/" ,
2024-02-20 17:16:47 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List"
]
2024-02-18 03:00:28 +00:00
} ,
2024-02-23 03:00:28 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/" ,
"source" : "cve@mitre.org"
} ,
2024-03-04 05:00:28 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" ,
"source" : "cve@mitre.org"
} ,
2024-02-15 00:55:29 +00:00
{
"url" : "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html" ,
2024-02-20 17:16:47 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
2024-02-15 00:55:29 +00:00
} ,
2024-02-15 03:00:29 +00:00
{
"url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387" ,
2024-02-20 17:16:47 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2024-02-15 03:00:29 +00:00
} ,
2024-02-14 17:08:46 +00:00
{
"url" : "https://news.ycombinator.com/item?id=39367411" ,
2024-02-20 17:16:47 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2024-02-14 17:08:46 +00:00
} ,
2024-02-14 21:00:36 +00:00
{
"url" : "https://news.ycombinator.com/item?id=39372384" ,
2024-02-20 17:16:47 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking"
]
2024-02-14 21:00:36 +00:00
} ,
2024-02-14 17:08:46 +00:00
{
"url" : "https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/" ,
2024-02-20 17:16:47 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2024-02-14 17:08:46 +00:00
} ,
2024-03-07 19:03:27 +00:00
{
"url" : "https://security.netapp.com/advisory/ntap-20240307-0007/" ,
"source" : "cve@mitre.org"
} ,
2024-02-14 17:08:46 +00:00
{
"url" : "https://www.athene-center.de/aktuelles/key-trap" ,
2024-02-20 17:16:47 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2024-02-14 17:08:46 +00:00
} ,
2024-02-15 21:00:30 +00:00
{
"url" : "https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf" ,
2024-02-20 17:16:47 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Technical Description" ,
"Third Party Advisory"
]
2024-02-15 21:00:30 +00:00
} ,
2024-02-14 17:08:46 +00:00
{
"url" : "https://www.isc.org/blogs/2024-bind-security-release/" ,
2024-02-20 17:16:47 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2024-02-14 17:08:46 +00:00
} ,
{
"url" : "https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/" ,
2024-02-20 17:16:47 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Press/Media Coverage" ,
"Third Party Advisory"
]
2024-02-14 17:08:46 +00:00
} ,
{
"url" : "https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/" ,
2024-02-20 17:16:47 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
2024-02-14 17:08:46 +00:00
}
]
}