CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
EPSS
Percentile
84.9%
Issue Overview:
A flaw was found in the DNS64 implementation in BIND when using Response Policy Zones (RPZ). If a remote attacker sent a specially-crafted query to a named server that is using RPZ rewrite rules, named could exit unexpectedly with an assertion failure. Note that DNS64 support is not enabled by default. (CVE-2012-5689)
Affected Packages:
bind
Issue Correction:
Run yum update bind to update your system.
New Packages:
i686:
bind-sdb-9.8.2-0.17.rc1.27.amzn1.i686
bind-9.8.2-0.17.rc1.27.amzn1.i686
bind-utils-9.8.2-0.17.rc1.27.amzn1.i686
bind-chroot-9.8.2-0.17.rc1.27.amzn1.i686
bind-debuginfo-9.8.2-0.17.rc1.27.amzn1.i686
bind-devel-9.8.2-0.17.rc1.27.amzn1.i686
bind-libs-9.8.2-0.17.rc1.27.amzn1.i686
src:
bind-9.8.2-0.17.rc1.27.amzn1.src
x86_64:
bind-debuginfo-9.8.2-0.17.rc1.27.amzn1.x86_64
bind-chroot-9.8.2-0.17.rc1.27.amzn1.x86_64
bind-libs-9.8.2-0.17.rc1.27.amzn1.x86_64
bind-9.8.2-0.17.rc1.27.amzn1.x86_64
bind-devel-9.8.2-0.17.rc1.27.amzn1.x86_64
bind-utils-9.8.2-0.17.rc1.27.amzn1.x86_64
bind-sdb-9.8.2-0.17.rc1.27.amzn1.x86_64
Red Hat: CVE-2012-5689
Mitre: CVE-2012-5689