Miggo Logo

GHSA-mmwx-rj87-vfgr: DNSJava affected by KeyTrap - NSEC3 closest encloser proof can exhaust CPU resources

6.5

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
7/22/2024
Updated
11/18/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
dnsjava:dnsjavamaven>= 3.5.0, < 3.6.03.6.0
org.jitsi:dnssecjavamaven<= 2.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from uncontrolled resource consumption during NSEC3 validation. Key functions in NSEC3ValUtils.java handled DNSSEC proofs without limiting cryptographic computations. The commit adds: 1) MAX_NSEC3_CALCULATIONS constant, 2) Nsec3ValidationState tracking, and 3) early termination checks. These changes directly address the KeyTrap vulnerability by constraining SHA-1 iterations during NSEC3 closest encloser proof validation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t Us*rs usin* t** `V*li**tin*R*solv*r` *or *NSS** v*li**tion **n run into *PU *x**ustion wit* sp**i*lly *r**t** *NSS**-si*n** zon*s. ### P*t***s Us*rs s*oul* up*r*** to *nsj*v* v*.*.* ### Work*roun*s *lt*ou** not r**omm*n***, only usin* *

Reasoning

T** vuln*r**ility st*ms *rom un*ontroll** r*sour** *onsumption *urin* NS*** v*li**tion. K*y *un*tions in NS***V*lUtils.j*v* **n*l** *NSS** proo*s wit*out limitin* *rypto*r*p*i* *omput*tions. T** *ommit ***s: *) M*X_NS***_**L*UL*TIONS *onst*nt, *) Ns*