Vulnerability Details : CVE-2017-11104
Potential exploit
Knot DNS before 2.4.5 and 2.5.x before 2.5.2 contains a flaw within the TSIG protocol implementation that would allow an attacker with a valid key name and algorithm to bypass TSIG authentication if no additional ACL restrictions are set, because of an improper TSIG validity period check.
Vulnerability category: Input validation
Products affected by CVE-2017-11104
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:knot-dns:knot_dns:*:*:*:*:*:*:*:*
- cpe:2.3:a:knot-dns:knot_dns:2.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:knot-dns:knot_dns:2.5.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-11104
2.58%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-11104
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
5.9
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |
2.2
|
3.6
|
NIST |
CWE ids for CVE-2017-11104
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-11104
-
http://www.debian.org/security/2017/dsa-3910
Debian -- Security Information -- DSA-3910-1 knotThird Party Advisory
-
https://lists.nic.cz/pipermail/knot-dns-users/2017-June/001144.html
[knot-dns-users] Knot DNS 2.5.2 and 2.4.5 releasesBroken Link;Mailing List;Patch;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00089.html
[security-announce] openSUSE-SU-2020:1112-1: moderate: Security update fBroken Link
-
https://bugs.debian.org/865678
#865678 - knot: CVE-2017-11104: Improper TSIG validity period check can allow TSIG forgery - Debian Bug report logsIssue Tracking;Third Party Advisory
-
http://www.synacktiv.ninja/ressources/Knot_DNS_TSIG_Signature_Forgery.pdf
Exploit;Mitigation;Patch;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00049.html
[security-announce] openSUSE-SU-2020:1232-1: moderate: Security update fBroken Link
-
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00078.html
[security-announce] openSUSE-SU-2020:1086-1: moderate: Security update fBroken Link
-
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00076.html
[security-announce] openSUSE-SU-2020:1085-1: moderate: Security update fBroken Link
-
http://www.securityfocus.com/bid/99598
Knot DNS CVE-2017-11104 Authentication Bypass VulnerabilityBroken Link
Jump to