ALAS-2015-573

Related Vulnerabilities: CVE-2015-5477  

As <a href="https://kb.isc.org/article/AA-01272/0">reported upstream</a>, an error in the handling of TKEY queries can be exploited by an attacker for use as a denial-of-service vector, as a constructed packet can use the defect to trigger a REQUIRE assertion failure, causing BIND to exit.

ALAS-2015-573


Amazon Linux AMI Security Advisory: ALAS-2015-573
Advisory Release Date: 2015-07-28 11:32 Pacific
Advisory Updated Date: 2015-07-28 11:32 Pacific
Severity: Critical
References: CVE-2015-5477 

Issue Overview:

As <a href="https://kb.isc.org/article/AA-01272/0">reported upstream</a>, an error in the handling of TKEY queries can be exploited by an attacker for use as a denial-of-service vector, as a constructed packet can use the defect to trigger a REQUIRE assertion failure, causing BIND to exit.


Affected Packages:

bind


Issue Correction:
Run yum update bind to update your system.

New Packages:
i686:
    bind-libs-9.8.2-0.30.rc1.38.amzn1.i686
    bind-chroot-9.8.2-0.30.rc1.38.amzn1.i686
    bind-sdb-9.8.2-0.30.rc1.38.amzn1.i686
    bind-utils-9.8.2-0.30.rc1.38.amzn1.i686
    bind-devel-9.8.2-0.30.rc1.38.amzn1.i686
    bind-9.8.2-0.30.rc1.38.amzn1.i686
    bind-debuginfo-9.8.2-0.30.rc1.38.amzn1.i686

src:
    bind-9.8.2-0.30.rc1.38.amzn1.src

x86_64:
    bind-sdb-9.8.2-0.30.rc1.38.amzn1.x86_64
    bind-chroot-9.8.2-0.30.rc1.38.amzn1.x86_64
    bind-libs-9.8.2-0.30.rc1.38.amzn1.x86_64
    bind-utils-9.8.2-0.30.rc1.38.amzn1.x86_64
    bind-9.8.2-0.30.rc1.38.amzn1.x86_64
    bind-debuginfo-9.8.2-0.30.rc1.38.amzn1.x86_64
    bind-devel-9.8.2-0.30.rc1.38.amzn1.x86_64