Vulnerability Details : CVE-2023-50387
Potential exploit
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.
Vulnerability category: Denial of service
Products affected by CVE-2023-50387
- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2022_23h2:-:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*
- cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*
- cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*
- cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
- cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
- cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
- cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:*
- cpe:2.3:a:nic:knot_resolver:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-50387
40.95%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-50387
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-05-12 |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | 2024-02-20 |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
N/A
|
N/A
|
RedHat-CVE-2023-50387 | 2024-02-13 |
CWE ids for CVE-2023-50387
-
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2023-50387
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
[SECURITY] Fedora 38 Update: pdns-recursor-4.8.6-1.fc38 - package-announce - Fedora Mailing-Lists
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
[SECURITY] Fedora 39 Update: pdns-recursor-4.9.3-1.fc39 - package-announce - Fedora Mailing-Lists
-
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
v5.7.1 · Knot projects / Knot Resolver · GitLabPatch
-
https://news.ycombinator.com/item?id=39367411
Just one bad packet can bring down a vulnerable DNS server thanks to DNSSEC | Hacker NewsThird Party Advisory
-
https://security.netapp.com/advisory/ntap-20240307-0007/
CVE-2023-50387 ISC BIND Vulnerability in NetApp Products | NetApp Product Security
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
[SECURITY] Fedora 38 Update: bind9-next-9.19.21-1.fc38 - package-announce - Fedora Mailing-Lists
-
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
NLnet Labs - News - Unbound 1.19.1 releasedVendor Advisory
-
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
PowerDNS Security Advisory 2024-01: crafted DNSSEC records in a zone can lead to a denial of service in Recursor — PowerDNS Recursor documentationThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
[SECURITY] Fedora 39 Update: dnsmasq-2.90-1.fc39 - package-announce - Fedora Mailing-ListsMailing List
-
https://news.ycombinator.com/item?id=39372384
Just one bad packet can bring down a vulnerable DNS server thanks to DNSSEC | Hacker NewsIssue Tracking
-
https://access.redhat.com/security/cve/CVE-2023-50387
CVE-2023-50387- Red Hat Customer PortalThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/02/16/3
oss-security - Re: Unbound: disclosure of CVE-2023-50387 and CVE-2023-50868 DNSSEC validation vulnerabilitiesMailing List
-
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
[SECURITY] [DLA 3816-1] bind9 security update
-
https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/
KeyTrap DNS Attack Could Disable Large Parts of Internet: Researchers - SecurityWeekPress/Media Coverage;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
[SECURITY] Fedora 38 Update: dnsmasq-2.90-1.fc38 - package-announce - Fedora Mailing-Lists
-
https://bugzilla.suse.com/show_bug.cgi?id=1219823
1219823 – (CVE-2023-50387) VUL-0: CVE-2023-50387 : unbound, pdns, bind, dnsmasq: Denial Of Service while trying to validate specially crafted DNSSEC responsesIssue Tracking
-
https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/
DNSSEC vulnerability puts big chunk of the internet at risk • The RegisterPatch;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
[SECURITY] Fedora 39 Update: bind9-next-9.19.21-1.fc39 - package-announce - Fedora Mailing-Lists
-
https://www.isc.org/blogs/2024-bind-security-release/
BIND 9 Security Release and Multi-Vendor Vulnerability Handling - ISCThird Party Advisory
-
https://datatracker.ietf.org/doc/html/rfc4035
RFC 4035 - Protocol Modifications for the DNS Security Extensions
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
[SECURITY] Fedora 38 Update: bind-dyndb-ldap-11.10-23.fc38 - package-announce - Fedora Mailing-Lists
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
[SECURITY] Fedora 39 Update: unbound-1.19.1-2.fc39 - package-announce - Fedora Mailing-ListsMailing List
-
https://kb.isc.org/docs/cve-2023-50387
CVE-2023-50387Third Party Advisory;VDB Entry
-
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387
CVE-2023-50387 - Security Update Guide - Microsoft - MITRE: CVE-2023-50387 DNSSEC verification complexity can be exploited to exhaust CPU resources and stall DNS resolversPatch;Vendor Advisory
-
https://www.athene-center.de/aktuelles/key-trap
Key Trap - ATHENEThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
[SECURITY] Fedora 38 Update: unbound-1.19.1-1.fc38 - package-announce - Fedora Mailing-Lists
-
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
[Dnsmasq-discuss] Announce: dnsmasq-2.90.Mailing List;Third Party Advisory
-
https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf
Technical Description;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
[SECURITY] [DLA 3736-1] unbound security update
-
http://www.openwall.com/lists/oss-security/2024/02/16/2
oss-security - Re: Unbound: disclosure of CVE-2023-50387 and CVE-2023-50868 DNSSEC validation vulnerabilitiesMailing List
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
[SECURITY] Fedora 39 Update: bind-dyndb-ldap-11.10-24.fc39 - package-announce - Fedora Mailing-ListsMailing List
Jump to