Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-50868

EPSS 11.80% · P94
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-50868

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Knot Resolver 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Knot Resolver是一款缓存DNS解析器实现,它包括解析器库和守护程序。 Knot Resolver 5.7.1之前版本存在安全漏洞,该漏洞源于允许远程攻击者通过随机子域攻击造成拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2023-50868

#POC DescriptionSource LinkShenlong Link
1This project generates DNS zonefiles with custom NSEC3 parameters to reproduce and evaluate the attacks in CVE-2023-50868.https://github.com/Goethe-Universitat-Cybersecurity/NSEC3-Encloser-AttackPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-50868

登录查看更多情报信息。

Same Patch Batch · n/a · 2024-02-14 · 105 CVEs total

CVE-2023-394258.8 HIGHIntel DSA 安全漏洞
CVE-2023-222938.2 HIGHIntel Thunderbolt DCH drivers 安全漏洞
CVE-2023-257777.9 HIGHIntel Thunderbolt DCH drivers 安全漏洞
CVE-2023-351217.8 HIGHIntel oneAPI DPC++/C++ Compiler 安全漏洞
CVE-2023-223427.7 HIGHIntel Thunderbolt DCH drivers 安全漏洞
CVE-2023-343517.5 HIGHIntel PCM 安全漏洞
CVE-2023-399417.1 HIGHIntel SUR 安全漏洞
CVE-2023-338757.1 HIGHIntel PROSet/Wireless WiFi Software 和 Intel Killer WiFi Software 安全漏洞
CVE-2023-326476.8 MEDIUMIntel Extreme Tuning Utility 安全漏洞
CVE-2023-326466.7 MEDIUMIntel VROC software 安全漏洞
CVE-2023-381356.7 MEDIUMIntel Performance Maximizer 安全漏洞
CVE-2023-326186.7 MEDIUMIntel oneAPI Toolkit and component software installers 安全漏洞
CVE-2023-284076.7 MEDIUMIntel Extreme Tuning Utility 安全漏洞
CVE-2023-343156.7 MEDIUMIntel VROC software 安全漏洞
CVE-2023-350036.7 MEDIUMIntel VROC software 安全漏洞
CVE-2023-257796.7 MEDIUMIntel Thunderbolt DCH drivers 安全漏洞
CVE-2023-287396.7 MEDIUMIntel Chipset Driver Software 安全漏洞
CVE-2023-412316.7 MEDIUMIntel ACAT software 安全漏洞
CVE-2023-259456.7 MEDIUMIntel OFU software 安全漏洞
CVE-2023-245426.7 MEDIUMIntel Thunderbolt DCH drivers 安全漏洞

Showing top 20 of 105 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-50868

No comments yet


Leave a comment