An issue was found in unbound, where the processing of responses coming from DNSSEC-signed zones using NSEC3 can cause CPU exhaustion on a DNSSEC-validating resolver. By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service. This issue is fixed in version 1.19.1.
CVE-2023-50868 - Medium Severity Vulnerability
Vulnerable Libraries - unboundrelease-1.19.0rc1, unboundrelease-1.19.0rc1, unboundrelease-1.19.0rc1, unboundrelease-1.19.0rc1, unboundrelease-1.19.0rc1, unboundrelease-1.19.0rc1, unboundrelease-1.19.0rc1
Vulnerability Details
An issue was found in unbound, where the processing of responses coming from DNSSEC-signed zones using NSEC3 can cause CPU exhaustion on a DNSSEC-validating resolver. By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service. This issue is fixed in version 1.19.1.
Publish Date: 2023-12-15
URL: CVE-2023-50868
CVSS 3 Score Details (5.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://seclists.org/oss-sec/2024/q1/125
Release Date: 2023-12-15
Fix Resolution: release-1.19.1
Step up your Open Source Security Game with Mend here