Lucene search

K
redhatcveRedhat.comRH:CVE-2023-50387
HistoryFeb 14, 2024 - 8:32 p.m.

CVE-2023-50387

2024-02-1420:32:22
redhat.com
access.redhat.com
37
cve-2023-50387
dnssec
denial of service
red hat
package update

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

AI Score

Confidence

High

0.05 Low

EPSS

Percentile

92.9%

Processing specially crafted responses coming from DNSSEC-signed zones can lead to uncontrolled CPU usage, leading to a Denial of Service in the DNSSEC-validating resolver side. This vulnerability applies only for systems where DNSSEC validation is enabled.

Mitigation

There are no mitigations for this issue that meet Red Hat's secure workaround criteria. Updating the package to the version containing the fix is recommended.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

AI Score

Confidence

High

0.05 Low

EPSS

Percentile

92.9%