Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2001-0497 | First vendor Publication | 2001-07-21 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 7.8 | ||
Base Score | 7.8 | Environmental Score | 7.8 |
impact SubScore | 5.9 | Temporal Score | 7.8 |
Exploitabality Sub Score | 1.8 | ||
Attack Vector | Local | Attack Complexity | Low |
Privileges Required | Low | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 4.6 | Attack Range | Local |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
dnskeygen in BIND 8.2.4 and earlier, and dnssec-keygen in BIND 9.1.2 and earlier, set insecure permissions for a HMAC-MD5 shared secret key file used for DNS Transactional Signatures (TSIG), which allows attackers to obtain the keys and perform dynamic DNS updates. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0497 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-1 | Accessing Functionality Not Properly Constrained by ACLs |
CAPEC-19 | Embedding Scripts within Scripts |
CAPEC-81 | Web Logs Tampering |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-276 | Incorrect Default Permissions |
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
5609 | ISC BIND dnskeygen HMAC-MD5 Shared Secret Key File Disclosure ISC BIND 8.2.4 and earlier and ISC BIND 9.1.2 and earlier contain a flaw in two helper programs that may lead to an unauthorized information disclosure. The issue is triggered when the dnskeygen utility (BIND 8) or the dnssec-keygen utility (BIND 9) are used to generate key files used in secure communications. The files created are not set with sufficently secure permissions which will disclose of the shared secret keys. These keys can be used to make dynamic updated to the BIND server resulting in a loss of integerty. |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-11-28 23:24:20 |
|
2024-11-28 12:04:29 |
|
2024-08-02 12:01:49 |
|
2024-08-02 01:01:14 |
|
2024-02-08 21:28:19 |
|
2024-02-02 01:01:38 |
|
2024-02-01 12:01:16 |
|
2023-09-05 12:01:34 |
|
2023-09-05 01:01:07 |
|
2023-09-02 12:01:35 |
|
2023-09-02 01:01:07 |
|
2023-08-12 12:01:55 |
|
2023-08-12 01:01:07 |
|
2023-08-11 12:01:38 |
|
2023-08-11 01:01:08 |
|
2023-08-06 12:01:30 |
|
2023-08-06 01:01:08 |
|
2023-08-04 12:01:34 |
|
2023-08-04 01:01:08 |
|
2023-07-14 12:01:32 |
|
2023-07-14 01:01:09 |
|
2023-03-29 01:01:31 |
|
2023-03-28 12:01:13 |
|
2022-10-11 12:01:23 |
|
2022-10-11 01:01:01 |
|
2022-03-30 01:01:16 |
|
2021-05-08 12:01:06 |
|
2021-05-04 12:01:22 |
|
2021-04-22 01:01:33 |
|
2020-12-10 12:01:04 |
|
2020-12-10 01:00:58 |
|
2020-05-23 01:35:32 |
|
2020-05-23 00:14:38 |
|
2019-03-19 12:01:25 |
|
2018-11-30 12:01:07 |
|
2018-09-21 00:19:09 |
|
2017-10-10 09:23:20 |
|
2016-06-28 14:55:55 |
|
2016-04-26 11:53:17 |
|
2013-05-11 12:04:14 |
|