Knot DNS before 2.4.5 and 2.5.x before 2.5.2 contains a flaw within the TSIG protocol implementation that would allow an attacker with a valid key name and algorithm to bypass TSIG authentication if no additional ACL restrictions are set, because of an improper TSIG validity period check.
{
"binaries": [
{
"binary_version": "2.1.1-1build1",
"binary_name": "knot"
},
{
"binary_version": "2.1.1-1build1",
"binary_name": "knot-dnsutils"
},
{
"binary_version": "2.1.1-1build1",
"binary_name": "knot-host"
},
{
"binary_version": "2.1.1-1build1",
"binary_name": "libdnssec0"
},
{
"binary_version": "2.1.1-1build1",
"binary_name": "libknot-dev"
},
{
"binary_version": "2.1.1-1build1",
"binary_name": "libknot1"
},
{
"binary_version": "2.1.1-1build1",
"binary_name": "libzscanner0"
}
]
}