Certain DNSSEC aspects of the DNS protocol (in RFC 4035 and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses when there is a zone with many DNSKEY and RRSIG records, aka the "KeyTrap" issue. The protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 2 - Dnsmasq Extra | dnsmasq | 2024-04-10 22:27 | ALAS2DNSMASQ-2024-002 |
Amazon Linux 2 - Core | bind | 2024-04-24 22:15 | ALAS2-2024-2530 |
Amazon Linux 2023 | bind | 2024-02-29 10:29 | ALAS2023-2024-550 |
Amazon Linux 2023 | dnsmasq | 2024-02-29 10:29 | ALAS2023-2024-552 |
Amazon Linux 2 - Core | unbound | 2024-02-29 10:03 | ALAS2-2024-2481 |
Amazon Linux 2023 | unbound | 2024-02-29 10:29 | ALAS2023-2024-553 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
NVD | CVSSv3 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |