Knot Resolver through 5.5.1 may allow DNS cache poisoning when there is an attempt to limit forwarding actions by filters.
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Knot_resolver | Nic | * | 5.5.1 (including) |
Knot-resolver | Ubuntu | bionic | * |
Knot-resolver | Ubuntu | devel | * |
Knot-resolver | Ubuntu | esm-apps/bionic | * |
Knot-resolver | Ubuntu | esm-apps/focal | * |
Knot-resolver | Ubuntu | esm-apps/jammy | * |
Knot-resolver | Ubuntu | esm-apps/noble | * |
Knot-resolver | Ubuntu | esm-apps/xenial | * |
Knot-resolver | Ubuntu | focal | * |
Knot-resolver | Ubuntu | impish | * |
Knot-resolver | Ubuntu | jammy | * |
Knot-resolver | Ubuntu | kinetic | * |
Knot-resolver | Ubuntu | lunar | * |
Knot-resolver | Ubuntu | mantic | * |
Knot-resolver | Ubuntu | noble | * |
Knot-resolver | Ubuntu | oracular | * |
Knot-resolver | Ubuntu | upstream | * |