CVE-2017-11104
08.07.2017, 10:29
Knot DNS before 2.4.5 and 2.5.x before 2.5.2 contains a flaw within the TSIG protocol implementation that would allow an attacker with a valid key name and algorithm to bypass TSIG authentication if no additional ACL restrictions are set, because of an improper TSIG validity period check.Enginsight
| Vendor | Product | Version |
|---|---|---|
| knot-dns | knot_dns | 𝑥 ≤ 2.4.4 |
| knot-dns | knot_dns | 2.5.0 |
| knot-dns | knot_dns | 2.5.1 |
| debian | debian_linux | 8.0 |
| debian | debian_linux | 9.0 |
| debian | debian_linux | 10.0 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| knot |
|
Common Weakness Enumeration
References