漏洞类别:Amazon Linux
漏洞等级:
漏洞信息
Improper fetch cleanup sequencing in the resolver can cause named to crashA use-after-free flaw leading to denial of service was found in the way BIND internally handled cleanup operations on upstream recursion fetch contexts. A remote attacker could potentially use this flaw to make named, acting as a DNSSEC validating resolver, exit unexpectedly with an assertion failure via a specially crafted DNS request. (CVE-2017-3145 )
漏洞危害
Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
解决方案
Please refer to Amazon advisory ALAS-2018-954 for affected packages and patching details, or update with your package manager.
Patch:
Following are links for downloading patches to fix the vulnerabilities:
ALAS-2018-954: Amazon Linux (bind (9.9.4-51.amzn2.2) on noarch)
ALAS-2018-954: Amazon Linux (bind (9.9.4-51.amzn2.2) on x86_64)
ALAS-2018-954: Amazon Linux (bind (9.9.4-51.amzn2.2) on src)
0daybank
文章评论