First published: Sat Jul 21 2001(Updated: )
dnskeygen in BIND 8.2.4 and earlier, and dnssec-keygen in BIND 9.1.2 and earlier, set insecure permissions for a HMAC-MD5 shared secret key file used for DNS Transactional Signatures (TSIG), which allows attackers to obtain the keys and perform dynamic DNS updates.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISC BIND 9 | <=8.2.4 | |
ISC BIND 9 | >=9.0<=9.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0497 has a high severity due to the potential for unauthorized access to sensitive HMAC-MD5 keys.
To fix CVE-2001-0497, update BIND to versions later than 8.2.4 and 9.1.2 which secure the permissions of the TSIG key files.
CVE-2001-0497 affects BIND versions 8.2.4 and earlier as well as BIND 9.1.2 and earlier.
The impact of CVE-2001-0497 allows attackers to obtain HMAC-MD5 shared secret keys enabling unauthorized dynamic DNS updates.
A workaround for CVE-2001-0497 is to manually adjust the file permissions of the HMAC-MD5 key files to prevent unauthorized access.