Lucene search

K
amazonAmazonALAS2-2020-1441
HistoryJun 26, 2020 - 10:51 p.m.

Medium: bind

2020-06-2622:51:00
alas.aws.amazon.com
34

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.9 Medium

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.017 Low

EPSS

Percentile

87.6%

Issue Overview:

“managed-keys” is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure if, during key rollover, a trust anchor’s keys are replaced with keys which use an unsupported algorithm. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P1, 9.12.0 -> 9.12.3-P1, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5745. (CVE-2018-5745)

With pipelining enabled each incoming query on a TCP connection requires a similar resource allocation to a query received via UDP or via TCP without pipelining enabled. A client using a TCP-pipelined connection to a server could consume more resources than the server has been provisioned to handle. When a TCP connection with a large number of pipelined queries is closed, the load on the server releasing these multiple resources can cause it to become unresponsive, even for queries that can be answered authoritatively or from cache. (This is most likely to be perceived as an intermittent server problem). (CVE-2019-6477)

Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P2, 9.12.0 -> 9.12.3-P2, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2019-6465. (CVE-2019-6465)

Affected Packages:

bind

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update bind to update your system.

New Packages:

aarch64:  
    bind-9.11.4-9.P2.amzn2.0.4.aarch64  
    bind-pkcs11-9.11.4-9.P2.amzn2.0.4.aarch64  
    bind-pkcs11-utils-9.11.4-9.P2.amzn2.0.4.aarch64  
    bind-pkcs11-libs-9.11.4-9.P2.amzn2.0.4.aarch64  
    bind-pkcs11-devel-9.11.4-9.P2.amzn2.0.4.aarch64  
    bind-sdb-9.11.4-9.P2.amzn2.0.4.aarch64  
    bind-libs-lite-9.11.4-9.P2.amzn2.0.4.aarch64  
    bind-libs-9.11.4-9.P2.amzn2.0.4.aarch64  
    bind-utils-9.11.4-9.P2.amzn2.0.4.aarch64  
    bind-devel-9.11.4-9.P2.amzn2.0.4.aarch64  
    bind-lite-devel-9.11.4-9.P2.amzn2.0.4.aarch64  
    bind-chroot-9.11.4-9.P2.amzn2.0.4.aarch64  
    bind-sdb-chroot-9.11.4-9.P2.amzn2.0.4.aarch64  
    bind-export-libs-9.11.4-9.P2.amzn2.0.4.aarch64  
    bind-export-devel-9.11.4-9.P2.amzn2.0.4.aarch64  
    bind-debuginfo-9.11.4-9.P2.amzn2.0.4.aarch64  
  
i686:  
    bind-9.11.4-9.P2.amzn2.0.4.i686  
    bind-pkcs11-9.11.4-9.P2.amzn2.0.4.i686  
    bind-pkcs11-utils-9.11.4-9.P2.amzn2.0.4.i686  
    bind-pkcs11-libs-9.11.4-9.P2.amzn2.0.4.i686  
    bind-pkcs11-devel-9.11.4-9.P2.amzn2.0.4.i686  
    bind-sdb-9.11.4-9.P2.amzn2.0.4.i686  
    bind-libs-lite-9.11.4-9.P2.amzn2.0.4.i686  
    bind-libs-9.11.4-9.P2.amzn2.0.4.i686  
    bind-utils-9.11.4-9.P2.amzn2.0.4.i686  
    bind-devel-9.11.4-9.P2.amzn2.0.4.i686  
    bind-lite-devel-9.11.4-9.P2.amzn2.0.4.i686  
    bind-chroot-9.11.4-9.P2.amzn2.0.4.i686  
    bind-sdb-chroot-9.11.4-9.P2.amzn2.0.4.i686  
    bind-export-libs-9.11.4-9.P2.amzn2.0.4.i686  
    bind-export-devel-9.11.4-9.P2.amzn2.0.4.i686  
    bind-debuginfo-9.11.4-9.P2.amzn2.0.4.i686  
  
noarch:  
    bind-license-9.11.4-9.P2.amzn2.0.4.noarch  
  
src:  
    bind-9.11.4-9.P2.amzn2.0.4.src  
  
x86_64:  
    bind-9.11.4-9.P2.amzn2.0.4.x86_64  
    bind-pkcs11-9.11.4-9.P2.amzn2.0.4.x86_64  
    bind-pkcs11-utils-9.11.4-9.P2.amzn2.0.4.x86_64  
    bind-pkcs11-libs-9.11.4-9.P2.amzn2.0.4.x86_64  
    bind-pkcs11-devel-9.11.4-9.P2.amzn2.0.4.x86_64  
    bind-sdb-9.11.4-9.P2.amzn2.0.4.x86_64  
    bind-libs-lite-9.11.4-9.P2.amzn2.0.4.x86_64  
    bind-libs-9.11.4-9.P2.amzn2.0.4.x86_64  
    bind-utils-9.11.4-9.P2.amzn2.0.4.x86_64  
    bind-devel-9.11.4-9.P2.amzn2.0.4.x86_64  
    bind-lite-devel-9.11.4-9.P2.amzn2.0.4.x86_64  
    bind-chroot-9.11.4-9.P2.amzn2.0.4.x86_64  
    bind-sdb-chroot-9.11.4-9.P2.amzn2.0.4.x86_64  
    bind-export-libs-9.11.4-9.P2.amzn2.0.4.x86_64  
    bind-export-devel-9.11.4-9.P2.amzn2.0.4.x86_64  
    bind-debuginfo-9.11.4-9.P2.amzn2.0.4.x86_64  

Additional References

Red Hat: CVE-2018-5745, CVE-2019-6465, CVE-2019-6477

Mitre: CVE-2018-5745, CVE-2019-6465, CVE-2019-6477

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.9 Medium

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.017 Low

EPSS

Percentile

87.6%