The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.
| Software | From | Fixed in |
|---|---|---|
| isc / bind | 9.0.0 | 9.16.48 |
| isc / bind | 9.9.3 | 9.16.48 |
| isc / bind | 9.18.0 | 9.18.24 |
| isc / bind | 9.18.11 | 9.18.24 |
| isc / bind | 9.19.0 | 9.19.21 |
| fedoraproject / fedora | 38 | 38.x |
| fedoraproject / fedora | 39 | 39.x |
| debian / debian_linux | 10.0 | 10.0.x |
| debian / debian_linux | 11.0 | 11.0.x |
| redhat / enterprise_linux | 6.0 | 6.0.x |
| redhat / enterprise_linux | 7.0 | 7.0.x |
| redhat / enterprise_linux | 8.0 | 8.0.x |
| redhat / enterprise_linux | 8.2 | 8.2.x |
| redhat / enterprise_linux | 8.4 | 8.4.x |
| powerdns / recursor | - | 4.8.5 |
| powerdns / recursor | 4.9.0 | 4.9.3 |
| powerdns / recursor | 5.0.0 | 5.0.2 |