Knot DNS < 1.6.3 Multiple Vulnerabilities

High Nessus Plugin ID 87598

Synopsis

The remote DNS server is affected by multiple vulnerabilities.

Description

The remote host is running a version of Knot DNS prior to 1.6.3. It is, therefore, affected by multiple vulnerabilities :

- An out-of-bounds read error exists in the knot_rrset_rr_to_canonical() function. An unauthenticated, remote attacker can exploit this, via a specially crafted packet, to disclose sensitive information or cause a denial of service.
(VulnDB 120485)

- An out-of-bounds read error exists in the zone parser due to improper handling of origin domain names. An unauthenticated, remote attacker can exploit this, via a specially crafted zone, to disclose sensitive information or cause a denial of service.
(VulnDB 120486)

- An out-of-bounds read error exists in the rdata_seek() function. An unauthenticated, remote attacker can exploit this, via a specially crafted packet, to disclose sensitive information or cause a denial of service. (VulnDB 120487)

Solution

Upgrade to Knot DNS version 1.6.3 or later.

See Also

https://gitlab.labs.nic.cz/labs/knot/raw/v1.6.3/NEWS

Plugin Details

Severity: High

ID: 87598

File Name: knot_dns_1_6_3.nasl

Version: 1.3

Type: remote

Family: DNS

Published: 2015/12/22

Modified: 2018/08/10

Dependencies: 76798

Risk Information

Risk Factor: High

CVSSv2

Base Score: 8.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:C

Vulnerability Information

CPE: x-cpe:/a:cz.nic:knot_dns

Required KB Items: knot_dns/proto, Settings/ParanoidReport

Patch Publication Date: 2015/04/08

Vulnerability Publication Date: 2015/04/08