Lucene search

K
redhatcveRedhat.comRH:CVE-2023-50868
HistoryFeb 13, 2024 - 8:27 p.m.

CVE-2023-50868

2024-02-1320:27:25
redhat.com
access.redhat.com
22
cve-2023-50868
bind9
dnssec resolver
cpu exhaustion
denial of service
nsec3
dnssec validation

AI Score

7.7

Confidence

High

EPSS

0.001

Percentile

17.1%

A flaw was found in bind9. By flooding a DNSSEC resolver with responses coming from a DNSEC-signed zone using NSEC3, an attacker can lead the targeted resolver to a CPU exhaustion, further leading to a Denial of Service on the targeted host. This vulnerability applies only for systems where DNSSEC validation is enabled.

Mitigation

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.