CVE-2023-50868

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.

Fixed
MEDIUM (6.2)
  • logo

    System detected CVE-2023-50868

  • T

    Tim Bastin fixed CVE-2023-50868

  • logo

    System updated the risk assessment from 0 to 6.47

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 6.47 to 6.23

    System recalculated raw risk assessment

Reopen this vulnerability

You can reopen this vuln, if you plan to mitigate the risk now, or accepted this vuln by accident.

Last calculated at:

Affected component

debian/systemd

Installed version:
252.30
Fixed in:
no patch available

Management decisions across the organization

Copyright © 2025 L3montree GmbH and the DevGuard Contributors. All rights reserved. Version 2ab7b793efd72421aea8c3a994ac60202bf1b3a5