Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 624256 (CVE-2017-11104) - <net-dns/knot-{2.4.5, 2.5.2}: bypass the TSIG authentication
Summary: <net-dns/knot-{2.4.5, 2.5.2}: bypass the TSIG authentication
Status: RESOLVED FIXED
Alias: CVE-2017-11104
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://cve.mitre.org/cgi-bin/cvename...
Whiteboard: ~3 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2017-07-08 13:40 UTC by Christopher Díaz Riveros (RETIRED)
Modified: 2017-08-27 21:30 UTC (History)
5 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2017-07-08 13:40:45 UTC
CZ.NIC has released Knot DNS 2.5.2 and Knot DNS 2.4.5. Beside
several fixes and improvements, these versions fix a flaw within the
TSIG protocol implementation that would allow an attacker with a
valid key name and algorithm to bypass the TSIG authentication if no
additional ACL restrictions is set. 

From $url:

References:

http://www.synacktiv.ninja/ressources/Knot_DNS_TSIG_Signature_Forgery.pdf
https://bugs.debian.org/865678
https://lists.nic.cz/pipermail/knot-dns-users/2017-June/001144.html
Comment 1 Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2017-07-21 03:49:22 UTC
Ping

Maintainer, could you please confirm that the bug is fixed in the tree?

It seems that the bug was fixed in the next version (2.5.3 is the latest stable version right now) and the tree has 2.5.2

Thanks
Comment 2 Jonas Stein gentoo-dev 2017-08-01 17:27:04 UTC
Unfortunately we had to drop the maintainer.
Comment 3 Pierre-Olivier Mercier 2017-08-23 13:35:28 UTC
Hi,

Indeed, this bug is fixed in the tree. There are only 2.4.5 and 2.5.3 versions in tree (which both include fix in upstream tarball).
Comment 4 Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2017-08-23 15:25:45 UTC
(In reply to Pierre-Olivier Mercier from comment #3)
> Hi,
> 
> Indeed, this bug is fixed in the tree. There are only 2.4.5 and 2.5.3
> versions in tree (which both include fix in upstream tarball).

Thank you for the info.

@Security I dropped to ~3 since there are no stable versions in the tree. Could you please confirm to be able to close de report?

Thanks

Gentoo Security Padawan
ChrisADR