Alpaquita LinuxStreamSecurity Advisory
Search Cve

CVE-2023-50387

Published: February 14, 2024Last modified: February 14, 2024

Description

Certain DNSSEC aspects of the DNS protocol (in RFC 4035 and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses when there is a zone with many DNSKEY and RRSIG records, aka the "KeyTrap" issue. The protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.

Severity score breakdown

ParameterValue
Base score7.5
Attack VectorNETWORK
Attack complexityLOW
Privileges requiredNONE
User interactionNONE
ScopeUNCHANGED
ConfidentialityNONE
Integrity impactNONE
Availability impactHIGH
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSbindFixed (9.18.24-r0)
dnsmasqFixed (2.90-r0)
StreambindFixed (9.18.24-r0)
dnsmasqFixed (2.90-r0)

References

Published BELL-SAs

ON THIS PAGE