ID

VAR-201405-0568


TITLE

Knot DNS TSIG Signature spoofing vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-201405-076

DESCRIPTION

Knot DNS is a high-performance DNS server developed by the Czech Internet Network Information Center (CZ.NIC). It supports all key DNS system features, such as zone conversion, dynamic update, and DNS Security Extensions (DNSSEC). A spoofing vulnerability exists in versions of Knot DNS prior to 1.4.5. The vulnerability stems from an error in the 'knot_tsig_check_digest ()' function when verifying a TSIG signature. Attackers can use this vulnerability to spoof signatures and bypass established session authentication. An attacker can exploit this issue to conduct spoofing attacks. This may aid in further attacks

Trust: 0.81

sources: CNNVD: CNNVD-201405-076 // BID: 67187

AFFECTED PRODUCTS

vendor:knotmodel:dns knot dnsscope:eqversion:1.4.4

Trust: 0.3

vendor:knotmodel:dns knot dnsscope:neversion:1.4.5

Trust: 0.3

sources: BID: 67187

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201405-076

TYPE

Input Validation Error

Trust: 0.3

sources: BID: 67187

EXTERNAL IDS

db:BIDid:67187

Trust: 0.9

db:CNNVDid:CNNVD-201405-076

Trust: 0.6

sources: BID: 67187 // CNNVD: CNNVD-201405-076

REFERENCES

url:http://www.securityfocus.com/bid/67187

Trust: 0.6

url:https://www.knot-dns.cz/

Trust: 0.3

sources: BID: 67187 // CNNVD: CNNVD-201405-076

CREDITS

The vendor reported this issue.

Trust: 0.9

sources: BID: 67187 // CNNVD: CNNVD-201405-076

SOURCES

db:BIDid:67187
db:CNNVDid:CNNVD-201405-076

LAST UPDATE DATE

2022-05-17T02:08:08.299000+00:00


SOURCES UPDATE DATE

db:BIDid:67187date:2014-05-01T00:00:00
db:CNNVDid:CNNVD-201405-076date:2014-05-08T00:00:00

SOURCES RELEASE DATE

db:BIDid:67187date:2014-05-01T00:00:00
db:CNNVDid:CNNVD-201405-076date:2014-05-08T00:00:00