76 lines
3.1 KiB
JSON
Raw Normal View History

{
"id": "CVE-2023-50868",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-14T16:15:45.377",
"lastModified": "2024-02-19T03:15:08.100",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the \"NSEC3\" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations."
},
{
"lang": "es",
"value": "El aspecto Closest Encloser Proof del protocolo DNS (en RFC 5155 cuando se omite la gu\u00eda RFC 9276) permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU para c\u00e1lculos SHA-1) a trav\u00e9s de respuestas DNSSEC en un ataque de subdominio aleatorio, tambi\u00e9n conocido como \" Problema NSEC3\". La especificaci\u00f3n RFC 5155 implica que un algoritmo debe realizar miles de iteraciones de una funci\u00f3n hash en determinadas situaciones."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/02/16/2",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/02/16/3",
"source": "cve@mitre.org"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-50868",
"source": "cve@mitre.org"
},
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1219826",
"source": "cve@mitre.org"
},
{
"url": "https://datatracker.ietf.org/doc/html/rfc5155",
"source": "cve@mitre.org"
},
{
"url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1",
"source": "cve@mitre.org"
},
{
"url": "https://kb.isc.org/docs/cve-2023-50868",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html",
"source": "cve@mitre.org"
},
{
"url": "https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/",
"source": "cve@mitre.org"
},
{
"url": "https://www.isc.org/blogs/2024-bind-security-release/",
"source": "cve@mitre.org"
}
]
}