Knot DNS before 2.4.5 and 2.5.x before 2.5.2 contains a flaw within the TSIG protocol implementation that would allow an attacker with a valid key name and algorithm to bypass TSIG authentication if no additional ACL restrictions are set, because of an improper TSIG validity period check.
{ "binaries": [ { "binary_version": "2.1.1-1build1", "binary_name": "knot" }, { "binary_version": "2.1.1-1build1", "binary_name": "knot-dnsutils" }, { "binary_version": "2.1.1-1build1", "binary_name": "knot-host" }, { "binary_version": "2.1.1-1build1", "binary_name": "libdnssec0" }, { "binary_version": "2.1.1-1build1", "binary_name": "libknot-dev" }, { "binary_version": "2.1.1-1build1", "binary_name": "libknot1" }, { "binary_version": "2.1.1-1build1", "binary_name": "libzscanner0" } ] }