The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 2 - Core | bind | 2024-04-24 22:15 | ALAS2-2024-2530 |
Amazon Linux 2023 | bind | 2024-02-29 10:29 | ALAS2023-2024-550 |
Amazon Linux 2 - Dnsmasq Extra | dnsmasq | 2024-04-10 22:27 | ALAS2DNSMASQ-2024-002 |
Amazon Linux 2023 | dnsmasq | 2024-02-29 10:29 | ALAS2023-2024-552 |
Amazon Linux 2 - Core | unbound | 2024-02-29 10:03 | ALAS2-2024-2481 |
Amazon Linux 2023 | unbound | 2024-02-29 10:29 | ALAS2023-2024-553 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |