Lucene search

K
amazonAmazonALAS-2018-954
HistoryFeb 20, 2018 - 9:02 p.m.

Important: bind

2018-02-2021:02:00
alas.aws.amazon.com
21

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.055

Percentile

93.3%

Issue Overview:

Improper fetch cleanup sequencing in the resolver can cause named to crash:
A use-after-free flaw leading to denial of service was found in the way BIND internally handled cleanup operations on upstream recursion fetch contexts. A remote attacker could potentially use this flaw to make named, acting as a DNSSEC validating resolver, exit unexpectedly with an assertion failure via a specially crafted DNS request.(CVE-2017-3145)

Affected Packages:

bind

Issue Correction:
Run yum update bind to update your system.

New Packages:

i686:  
    bind-sdb-9.8.2-0.62.rc1.57.amzn1.i686  
    bind-chroot-9.8.2-0.62.rc1.57.amzn1.i686  
    bind-devel-9.8.2-0.62.rc1.57.amzn1.i686  
    bind-debuginfo-9.8.2-0.62.rc1.57.amzn1.i686  
    bind-9.8.2-0.62.rc1.57.amzn1.i686  
    bind-utils-9.8.2-0.62.rc1.57.amzn1.i686  
    bind-libs-9.8.2-0.62.rc1.57.amzn1.i686  
  
src:  
    bind-9.8.2-0.62.rc1.57.amzn1.src  
  
x86_64:  
    bind-9.8.2-0.62.rc1.57.amzn1.x86_64  
    bind-debuginfo-9.8.2-0.62.rc1.57.amzn1.x86_64  
    bind-libs-9.8.2-0.62.rc1.57.amzn1.x86_64  
    bind-utils-9.8.2-0.62.rc1.57.amzn1.x86_64  
    bind-chroot-9.8.2-0.62.rc1.57.amzn1.x86_64  
    bind-sdb-9.8.2-0.62.rc1.57.amzn1.x86_64  
    bind-devel-9.8.2-0.62.rc1.57.amzn1.x86_64  

Additional References

Red Hat: CVE-2017-3145

Mitre: CVE-2017-3145

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.055

Percentile

93.3%