CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
EPSS
Percentile
99.6%
Issue Overview:
As discussed upstream (https://kb.isc.org/article/AA-01287/0), parsing a malformed DNSSEC key can cause a validating resolver to exit due to a failed assertion in buffer.c. It is possible for a remote attacker to deliberately trigger this condition, for example by using a query which requires a response from a zone containing a deliberately malformed key. (CVE-2015-5722)
Also disclosed upstream (https://kb.isc.org/article/AA-01291/0) today was CVE-2015-5986 which does not impact the version of bind in the Amazon Linux AMI.
Affected Packages:
bind
Issue Correction:
Run yum update bind to update your system.
New Packages:
i686:
bind-9.8.2-0.30.rc1.39.amzn1.i686
bind-libs-9.8.2-0.30.rc1.39.amzn1.i686
bind-sdb-9.8.2-0.30.rc1.39.amzn1.i686
bind-devel-9.8.2-0.30.rc1.39.amzn1.i686
bind-debuginfo-9.8.2-0.30.rc1.39.amzn1.i686
bind-chroot-9.8.2-0.30.rc1.39.amzn1.i686
bind-utils-9.8.2-0.30.rc1.39.amzn1.i686
src:
bind-9.8.2-0.30.rc1.39.amzn1.src
x86_64:
bind-sdb-9.8.2-0.30.rc1.39.amzn1.x86_64
bind-chroot-9.8.2-0.30.rc1.39.amzn1.x86_64
bind-debuginfo-9.8.2-0.30.rc1.39.amzn1.x86_64
bind-devel-9.8.2-0.30.rc1.39.amzn1.x86_64
bind-9.8.2-0.30.rc1.39.amzn1.x86_64
bind-utils-9.8.2-0.30.rc1.39.amzn1.x86_64
bind-libs-9.8.2-0.30.rc1.39.amzn1.x86_64
Red Hat: CVE-2015-5722
Mitre: CVE-2015-5722