CVE-2017-11104
08.07.2017, 10:29
Knot DNS before 2.4.5 and 2.5.x before 2.5.2 contains a flaw within the TSIG protocol implementation that would allow an attacker with a valid key name and algorithm to bypass TSIG authentication if no additional ACL restrictions are set, because of an improper TSIG validity period check.Enginsight
Vendor | Product | Version |
---|---|---|
knot-dns | knot_dns | 𝑥 ≤ 2.4.4 |
knot-dns | knot_dns | 2.5.0 |
knot-dns | knot_dns | 2.5.1 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
knot |
|
Common Weakness Enumeration
References