CVE-2023-50387
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.
Ciertos aspectos DNSSEC del protocolo DNS (en RFC 4035 y RFC relacionados) permiten a atacantes remotos provocar una denegación de servicio (consumo de CPU) a través de una o más respuestas DNSSEC cuando hay una zona con muchos registros DNSKEY y RRSIG, también conocido como "KeyTrap". " asunto. La especificación del protocolo implica que un algoritmo debe evaluar todas las combinaciones de registros DNSKEY y RRSIG.
Processing specially crafted responses coming from DNSSEC-signed zones can lead to uncontrolled CPU usage, leading to a Denial of Service in the DNSSEC-validating resolver side.
This vulnerability applies only for systems where DNSSEC validation is enabled.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-12-07 CVE Reserved
- 2024-02-13 CVE Published
- 2024-02-18 First Exploit
- 2024-06-11 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-400: Uncontrolled Resource Consumption
- CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
References (32)
URL | Date | SRC |
---|---|---|
https://github.com/knqyf263/CVE-2023-50387 | 2024-02-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 6.0 Search vendor "Redhat" for product "Enterprise Linux" and version "6.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 7.0 Search vendor "Redhat" for product "Enterprise Linux" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 8.0 Search vendor "Redhat" for product "Enterprise Linux" and version "8.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 9.0 Search vendor "Redhat" for product "Enterprise Linux" and version "9.0" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Server 2008 Search vendor "Microsoft" for product "Windows Server 2008" | r2 Search vendor "Microsoft" for product "Windows Server 2008" and version "r2" | sp1, x64 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Server 2012 Search vendor "Microsoft" for product "Windows Server 2012" | - | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Server 2012 Search vendor "Microsoft" for product "Windows Server 2012" | r2 Search vendor "Microsoft" for product "Windows Server 2012" and version "r2" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Server 2016 Search vendor "Microsoft" for product "Windows Server 2016" | - | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Server 2019 Search vendor "Microsoft" for product "Windows Server 2019" | - | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Server 2022 Search vendor "Microsoft" for product "Windows Server 2022" | - | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Server 2022 23h2 Search vendor "Microsoft" for product "Windows Server 2022 23h2" | - | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 39 Search vendor "Fedoraproject" for product "Fedora" and version "39" | - |
Affected
| ||||||
Thekelleys Search vendor "Thekelleys" | Dnsmasq Search vendor "Thekelleys" for product "Dnsmasq" | < 2.90 Search vendor "Thekelleys" for product "Dnsmasq" and version " < 2.90" | - |
Affected
| ||||||
Nic Search vendor "Nic" | Knot Resolver Search vendor "Nic" for product "Knot Resolver" | < 5.71 Search vendor "Nic" for product "Knot Resolver" and version " < 5.71" | - |
Affected
| ||||||
Powerdns Search vendor "Powerdns" | Recursor Search vendor "Powerdns" for product "Recursor" | >= 4.8.0 < 4.8.6 Search vendor "Powerdns" for product "Recursor" and version " >= 4.8.0 < 4.8.6" | - |
Affected
| ||||||
Powerdns Search vendor "Powerdns" | Recursor Search vendor "Powerdns" for product "Recursor" | >= 4.9.0 < 4.9.3 Search vendor "Powerdns" for product "Recursor" and version " >= 4.9.0 < 4.9.3" | - |
Affected
| ||||||
Powerdns Search vendor "Powerdns" | Recursor Search vendor "Powerdns" for product "Recursor" | >= 5.0.0 < 5.0.2 Search vendor "Powerdns" for product "Recursor" and version " >= 5.0.0 < 5.0.2" | - |
Affected
| ||||||
Isc Search vendor "Isc" | Bind Search vendor "Isc" for product "Bind" | >= 9.0.0 <= 9.16.46 Search vendor "Isc" for product "Bind" and version " >= 9.0.0 <= 9.16.46" | - |
Affected
| ||||||
Isc Search vendor "Isc" | Bind Search vendor "Isc" for product "Bind" | >= 9.18.0 <= 9.18.22 Search vendor "Isc" for product "Bind" and version " >= 9.18.0 <= 9.18.22" | - |
Affected
| ||||||
Isc Search vendor "Isc" | Bind Search vendor "Isc" for product "Bind" | >= 9.19.0 <= 9.19.20 Search vendor "Isc" for product "Bind" and version " >= 9.19.0 <= 9.19.20" | - |
Affected
| ||||||
Nlnetlabs Search vendor "Nlnetlabs" | Unbound Search vendor "Nlnetlabs" for product "Unbound" | < 1.19.1 Search vendor "Nlnetlabs" for product "Unbound" and version " < 1.19.1" | - |
Affected
|