4.3
CVSSv2

CVE-2017-11104

Published: 08/07/2017 Updated: 20/01/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Knot DNS prior to 2.4.5 and 2.5.x prior to 2.5.2 contains a flaw within the TSIG protocol implementation that would allow an attacker with a valid key name and algorithm to bypass TSIG authentication if no additional ACL restrictions are set, because of an improper TSIG validity period check.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

knot-dns knot dns 2.5.0

knot-dns knot dns

knot-dns knot dns 2.5.1

debian debian linux 8.0

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #865678 knot: CVE-2017-11104: Improper TSIG validity period check can allow TSIG forgery Package: src:knot; Maintainer for src:knot is knot packagers <knot@packagesdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 23 Jun 2017 17:03:01 UTC Severity: grave Tags: pat ...

Github Repositories

Exploit for TSIG bypass vulnerabilities in Bind (CVE-2017-3143) and Knot DNS (CVE-2017-11104)

TSIG Bypass exploit Exploit for CVE-2017-3143 in Bind and CVE-2017-11104 in Knot DNS See wwwsynacktivcom/ressources/CVE-2017-3143_BIND9_TSIG_dynamic_updates_vulnerability_Synacktivpdf for more info Author Clément Berthaux - clement (dot) berthaux (at) synacktiv (dot) com

A curated list of my GitHub stars!

Awesome Stars A curated list of my GitHub stars! Generated by starred Contents ASL Assembly AutoHotkey Batchfile C C# C++ CMake CSS Clojure CoffeeScript Dockerfile F# Go Groovy HTML Haskell Java JavaScript Jupyter Notebook Kotlin Logos Lua Makefile Objective-C Objective-C++ Others PHP Pascal Perl PowerShell Prolog Python Rascal Roff Ruby Rust Scala Shell Swift TSQL TeX Typ