It was discovered that the 389 Directory Server did not properly handle certain SASL-based authentication mechanisms. A user able to authenticate to the directory using these SASL mechanisms could connect as any other directory user, including the administrative Directory Manager account. This could allow them to modify configuration values, as well as read and write any data the directory holds.
Run yum update 389-ds-base to update your system.
i686: 389-ds-base-devel-18.104.22.168-1.16.amzn1.i686 389-ds-base-22.214.171.124-1.16.amzn1.i686 389-ds-base-debuginfo-126.96.36.199-1.16.amzn1.i686 389-ds-base-libs-188.8.131.52-1.16.amzn1.i686 src: 389-ds-base-184.108.40.206-1.16.amzn1.src x86_64: 389-ds-base-220.127.116.11-1.16.amzn1.x86_64 389-ds-base-devel-18.104.22.168-1.16.amzn1.x86_64 389-ds-base-libs-22.214.171.124-1.16.amzn1.x86_64 389-ds-base-debuginfo-126.96.36.199-1.16.amzn1.x86_64