7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.9 Medium
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.017 Low
EPSS
Percentile
87.6%
Issue Overview:
“managed-keys” is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure if, during key rollover, a trust anchor’s keys are replaced with keys which use an unsupported algorithm. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P1, 9.12.0 -> 9.12.3-P1, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5745. (CVE-2018-5745)
With pipelining enabled each incoming query on a TCP connection requires a similar resource allocation to a query received via UDP or via TCP without pipelining enabled. A client using a TCP-pipelined connection to a server could consume more resources than the server has been provisioned to handle. When a TCP connection with a large number of pipelined queries is closed, the load on the server releasing these multiple resources can cause it to become unresponsive, even for queries that can be answered authoritatively or from cache. (This is most likely to be perceived as an intermittent server problem). (CVE-2019-6477)
Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P2, 9.12.0 -> 9.12.3-P2, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2019-6465. (CVE-2019-6465)
Affected Packages:
bind
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update bind to update your system.
New Packages:
aarch64:
bind-9.11.4-9.P2.amzn2.0.4.aarch64
bind-pkcs11-9.11.4-9.P2.amzn2.0.4.aarch64
bind-pkcs11-utils-9.11.4-9.P2.amzn2.0.4.aarch64
bind-pkcs11-libs-9.11.4-9.P2.amzn2.0.4.aarch64
bind-pkcs11-devel-9.11.4-9.P2.amzn2.0.4.aarch64
bind-sdb-9.11.4-9.P2.amzn2.0.4.aarch64
bind-libs-lite-9.11.4-9.P2.amzn2.0.4.aarch64
bind-libs-9.11.4-9.P2.amzn2.0.4.aarch64
bind-utils-9.11.4-9.P2.amzn2.0.4.aarch64
bind-devel-9.11.4-9.P2.amzn2.0.4.aarch64
bind-lite-devel-9.11.4-9.P2.amzn2.0.4.aarch64
bind-chroot-9.11.4-9.P2.amzn2.0.4.aarch64
bind-sdb-chroot-9.11.4-9.P2.amzn2.0.4.aarch64
bind-export-libs-9.11.4-9.P2.amzn2.0.4.aarch64
bind-export-devel-9.11.4-9.P2.amzn2.0.4.aarch64
bind-debuginfo-9.11.4-9.P2.amzn2.0.4.aarch64
i686:
bind-9.11.4-9.P2.amzn2.0.4.i686
bind-pkcs11-9.11.4-9.P2.amzn2.0.4.i686
bind-pkcs11-utils-9.11.4-9.P2.amzn2.0.4.i686
bind-pkcs11-libs-9.11.4-9.P2.amzn2.0.4.i686
bind-pkcs11-devel-9.11.4-9.P2.amzn2.0.4.i686
bind-sdb-9.11.4-9.P2.amzn2.0.4.i686
bind-libs-lite-9.11.4-9.P2.amzn2.0.4.i686
bind-libs-9.11.4-9.P2.amzn2.0.4.i686
bind-utils-9.11.4-9.P2.amzn2.0.4.i686
bind-devel-9.11.4-9.P2.amzn2.0.4.i686
bind-lite-devel-9.11.4-9.P2.amzn2.0.4.i686
bind-chroot-9.11.4-9.P2.amzn2.0.4.i686
bind-sdb-chroot-9.11.4-9.P2.amzn2.0.4.i686
bind-export-libs-9.11.4-9.P2.amzn2.0.4.i686
bind-export-devel-9.11.4-9.P2.amzn2.0.4.i686
bind-debuginfo-9.11.4-9.P2.amzn2.0.4.i686
noarch:
bind-license-9.11.4-9.P2.amzn2.0.4.noarch
src:
bind-9.11.4-9.P2.amzn2.0.4.src
x86_64:
bind-9.11.4-9.P2.amzn2.0.4.x86_64
bind-pkcs11-9.11.4-9.P2.amzn2.0.4.x86_64
bind-pkcs11-utils-9.11.4-9.P2.amzn2.0.4.x86_64
bind-pkcs11-libs-9.11.4-9.P2.amzn2.0.4.x86_64
bind-pkcs11-devel-9.11.4-9.P2.amzn2.0.4.x86_64
bind-sdb-9.11.4-9.P2.amzn2.0.4.x86_64
bind-libs-lite-9.11.4-9.P2.amzn2.0.4.x86_64
bind-libs-9.11.4-9.P2.amzn2.0.4.x86_64
bind-utils-9.11.4-9.P2.amzn2.0.4.x86_64
bind-devel-9.11.4-9.P2.amzn2.0.4.x86_64
bind-lite-devel-9.11.4-9.P2.amzn2.0.4.x86_64
bind-chroot-9.11.4-9.P2.amzn2.0.4.x86_64
bind-sdb-chroot-9.11.4-9.P2.amzn2.0.4.x86_64
bind-export-libs-9.11.4-9.P2.amzn2.0.4.x86_64
bind-export-devel-9.11.4-9.P2.amzn2.0.4.x86_64
bind-debuginfo-9.11.4-9.P2.amzn2.0.4.x86_64
Red Hat: CVE-2018-5745, CVE-2019-6465, CVE-2019-6477
Mitre: CVE-2018-5745, CVE-2019-6465, CVE-2019-6477
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.9 Medium
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.017 Low
EPSS
Percentile
87.6%