Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

Amazon Linux: Security Advisory (ALAS-2013-158)
Information
Severity
Severity
High
Family
Family
Amazon Linux Local Security Checks
CVSSv2 Base
CVSSv2 Base
7.1
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:M/Au:N/C:N/I:N/A:C
Solution Type
Solution Type
Vendor Patch
Created
Created
7 years ago
Modified
Modified
1 year ago
Summary
The remote host is missing an update announced via the referenced Security Advisory.
Insight
Insight
A flaw was found in the DNS64 implementation in BIND when using Response Policy Zones (RPZ). If a remote attacker sent a specially-crafted query to a named server that is using RPZ rewrite rules, named could exit unexpectedly with an assertion failure. Note that DNS64 support is not enabled by default. (CVE-2012-5689 )
Solution
Solution
Run yum update bind to update your system.