Knot DNS before 2.4.5 and 2.5.x before 2.5.2 contains a flaw within the TSIG protocol implementation that would allow an attacker with a valid key name and algorithm to bypass TSIG authentication if no additional ACL restrictions are set, because of an improper TSIG validity period check.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 03:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00076.html - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00078.html - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00089.html - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00049.html - Broken Link | |
References | () http://www.debian.org/security/2017/dsa-3910 - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/99598 - Broken Link | |
References | () http://www.synacktiv.ninja/ressources/Knot_DNS_TSIG_Signature_Forgery.pdf - Exploit, Mitigation, Patch, Third Party Advisory | |
References | () https://bugs.debian.org/865678 - Issue Tracking, Third Party Advisory | |
References | () https://lists.nic.cz/pipermail/knot-dns-users/2017-June/001144.html - Broken Link, Mailing List, Patch, Third Party Advisory |
Information
Published : 2017-07-08 10:29
Updated : 2024-11-21 03:07
NVD link : CVE-2017-11104
Mitre link : CVE-2017-11104
CVE.ORG link : CVE-2017-11104
JSON object : View
Products Affected
knot-dns
- knot_dns
debian
- debian_linux
CWE
CWE-20
Improper Input Validation