Knot DNS before 2.4.5 and 2.5.x before 2.5.2 contains a flaw within the TSIG protocol implementation that would allow an attacker with a valid key name and algorithm to bypass TSIG authentication if no additional ACL restrictions are set, because of an improper TSIG validity period check.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.debian.org/security/2017/dsa-3910 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/99598 | vdb entry broken link |
https://bugs.debian.org/865678 | issue tracking third party advisory |
http://www.synacktiv.ninja/ressources/Knot_DNS_TSIG_Signature_Forgery.pdf | patch mitigation exploit third party advisory |
https://lists.nic.cz/pipermail/knot-dns-users/2017-June/001144.html | mailing list patch third party advisory broken link |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00078.html | vendor advisory broken link |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00076.html | vendor advisory broken link |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00089.html | vendor advisory broken link |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00049.html | vendor advisory broken link |