Amazon Linux AMI : bind (ALAS-2018-954)

High Nessus Plugin ID 106931


The remote Amazon Linux AMI host is missing a security update.


Improper fetch cleanup sequencing in the resolver can cause named to crash :

A use-after-free flaw leading to denial of service was found in the way BIND internally handled cleanup operations on upstream recursion fetch contexts. A remote attacker could potentially use this flaw to make named, acting as a DNSSEC validating resolver, exit unexpectedly with an assertion failure via a specially crafted DNS request.(CVE-2017-3145)


Run 'yum update bind' to update your system.

See Also

Plugin Details

Severity: High

ID: 106931

File Name: ala_ALAS-2018-954.nasl

Version: $Revision: 3.2 $

Type: local

Agent: unix

Published: 2018/02/22

Modified: 2018/02/26

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:bind, p-cpe:/a:amazon:linux:bind-chroot, p-cpe:/a:amazon:linux:bind-debuginfo, p-cpe:/a:amazon:linux:bind-devel, p-cpe:/a:amazon:linux:bind-libs, p-cpe:/a:amazon:linux:bind-sdb, p-cpe:/a:amazon:linux:bind-utils, cpe:/o:amazon:linux

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Patch Publication Date: 2018/02/20

Reference Information

CVE: CVE-2017-3145

ALAS: 2018-954

IAVA: 2018-A-0024