Your submission was sent successfully! Close

CVE-2017-11104

Published: 08 July 2017

Knot DNS before 2.4.5 and 2.5.x before 2.5.2 contains a flaw within the TSIG protocol implementation that would allow an attacker with a valid key name and algorithm to bypass TSIG authentication if no additional ACL restrictions are set, because of an improper TSIG validity period check.

Priority

Medium

CVSS 3 base score: 5.9

Status

Package Release Status
knot
Launchpad, Ubuntu, Debian
Upstream
Released (2.5.3-1)
Ubuntu 21.10 (Impish Indri) Not vulnerable
(2.6.5-3)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(2.6.5-3)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(2.6.5-3)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(2.6.5-3)
Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was needed)