Knot DNS before 2.4.5 and 2.5.x before 2.5.2 contains a flaw within the TSIG protocol implementation that would allow an attacker with a valid key name and algorithm to bypass TSIG authentication if no additional ACL restrictions are set, because of an improper TSIG validity period check.
{
"binaries": [
{
"binary_name": "knot",
"binary_version": "2.1.1-1build1"
},
{
"binary_name": "knot-dnsutils",
"binary_version": "2.1.1-1build1"
},
{
"binary_name": "knot-host",
"binary_version": "2.1.1-1build1"
},
{
"binary_name": "libdnssec0",
"binary_version": "2.1.1-1build1"
},
{
"binary_name": "libknot-dev",
"binary_version": "2.1.1-1build1"
},
{
"binary_name": "libknot1",
"binary_version": "2.1.1-1build1"
},
{
"binary_name": "libzscanner0",
"binary_version": "2.1.1-1build1"
}
]
}