Knot DNS before 2.4.5 and 2.5.x before 2.5.2 contains a flaw within the TSIG protocol implementation that would allow an attacker with a valid key name and algorithm to bypass TSIG authentication if no additional ACL restrictions are set, because of an improper TSIG validity period check.
{ "binaries": [ { "binary_name": "knot", "binary_version": "2.1.1-1build1" }, { "binary_name": "knot-dnsutils", "binary_version": "2.1.1-1build1" }, { "binary_name": "knot-host", "binary_version": "2.1.1-1build1" }, { "binary_name": "libdnssec0", "binary_version": "2.1.1-1build1" }, { "binary_name": "libknot-dev", "binary_version": "2.1.1-1build1" }, { "binary_name": "libknot1", "binary_version": "2.1.1-1build1" }, { "binary_name": "libzscanner0", "binary_version": "2.1.1-1build1" } ] }