First published: Mon Feb 12 2024(Updated: )
ISC BIND is vulnerable to a denial of service, caused by an error when preparing an NSEC3 closest encloser proof. By flooding the target resolver with queries, a remote attacker could exploit this vulnerability to cause CPU exhaustion on a DNSSEC-validating resolver.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2022 23H2 | ||
debian/bind9 | 1:9.16.50-1~deb11u2 1:9.16.50-1~deb11u3 1:9.18.28-1~deb12u2 1:9.18.33-1~deb12u2 1:9.20.4-4 1:9.20.5-1 | |
debian/dnsjava | <=2.1.8-2 | 3.6.2-2 |
debian/dnsmasq | <=2.85-1 | 2.85-1+deb11u1 2.90-4~deb12u1 2.91~test9-1 |
debian/knot-resolver | <=5.3.1-1+deb11u1 | 5.6.0-1+deb12u1 5.7.4-2 |
debian/pdns-recursor | <=4.4.2-3 | 4.8.8-1 4.8.8-1+deb12u1 5.1.3-2 5.2.0-2 |
debian/systemd | <=247.3-7+deb11u5 | 247.3-7+deb11u6 252.33-1~deb12u1 257.3-1 |
debian/unbound | 1.13.1-1+deb11u2 1.13.1-1+deb11u4 1.17.1-2+deb12u2 1.22.0-1 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.1 | 17.1.2 |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50868 is classified as a high severity vulnerability due to its potential for denial of service attacks.
CVE-2023-50868 can cause CPU exhaustion on DNSSEC-validating resolvers when exploited by an attacker flooding the resolver with queries.
CVE-2023-50868 affects multiple versions of Microsoft Windows Server, F5 BIG-IP, and several Debian packages such as bind9.
To mitigate CVE-2023-50868, apply the latest patches provided by the affected software vendors to remediate the vulnerability.
CVE-2023-50868 allows for a denial of service attack, leading to performance issues for affected DNS resolvers.