Lucene search

K
redhatcveRedhat.comRH:CVE-2023-50868
HistoryFeb 13, 2024 - 8:27 p.m.

CVE-2023-50868

2024-02-1320:27:25
redhat.com
access.redhat.com
15
cve-2023-50868
bind9
dnssec resolver
cpu exhaustion
denial of service
nsec3
dnssec validation

7.6 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.2%

A flaw was found in bind9. By flooding a DNSSEC resolver with responses coming from a DNSEC-signed zone using NSEC3, an attacker can lead the targeted resolver to a CPU exhaustion, further leading to a Denial of Service on the targeted host. This vulnerability applies only for systems where DNSSEC validation is enabled.

Mitigation

There are no mitigations for this issue that meet Red Hat's secure workaround criteria. Updating the package to the version containing the fix is recommended.