Description
BIND servers that are configured to use TKEY-based authentication via GSS-API tokens are vulnerable to excessive memory consumption when receiving and processing maliciously-constructed packets. Typically these servers will be found in Active Directory integrated DNS deployments and/or Kerberos-secured DNS environments.
This issue affects BIND 9 versions 9.0.0 through 9.16.50, 9.18.0 through 9.18.48, 9.20.0 through 9.20.22, 9.21.0 through 9.21.21, 9.9.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.48-S1, and 9.20.9-S1 through 9.20.22-S1.
Published: 2026-05-20
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

BIND 9 servers that use GSS-API based TKEY authentication are susceptible to excessive memory consumption when they receive specially crafted packets. An attacker can trigger a memory exhaustion condition by sending a sequence of these packets, which can cause the server to block or crash, thereby denying DNS services to legitimate clients. This vulnerability is categorized as a resource management weakness (CWE-771) and can compromise availability.

Affected Systems

The affected product is ISC BIND 9. Versions from 9.0.0 through 9.16.50, 9.18.0 through 9.18.48, 9.20.0 through 9.20.22, 9.21.0 through 9.21.21, as well as the corresponding -S1 releases, are vulnerable. Customers running these releases in Active Directory integrated or Kerberos-secured environments should review their deployment.

Risk and Exploitability

The base CVSS score is 7.5, indicating a high severity level. No EPSS data is available, and the vulnerability is not listed in CISA’s KEV catalog, suggesting that large-scale exploitation has not been confirmed yet. The likely attack vector is remote over the network; the attacker merely needs to craft malformed GSS-API TKEY packets and send them to the server. Because no workaround exists, the vendor recommends applying the official patch releases: 9.18.49, 9.20.23, 9.21.22 or their security-specific equivalents.

Generated by OpenCVE AI on May 20, 2026 at 14:37 UTC.

Remediation

Vendor Solution

Upgrade to the patched release most closely related to your current version of BIND 9: 9.18.49, 9.20.23, 9.21.22, 9.18.49-S1, or 9.20.23-S1.


Vendor Workaround

No workarounds known.


OpenCVE Recommended Actions

  • Upgrade ISC BIND 9 to a patched release such as 9.18.49, 9.20.23, 9.21.22, 9.18.49-S1, or 9.20.23-S1 following ISC’s update procedure.
  • If the environment does not require GSS-API based TKEY authentication, disable the feature in the BIND configuration to eliminate the attack surface.
  • After applying the patch or disabling TKEY, monitor DNS service performance and memory usage for abnormal spikes and verify that replication and resolution functions continue to operate correctly.

Generated by OpenCVE AI on May 20, 2026 at 14:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6285-1 bind9 security update
History

Wed, 20 May 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 May 2026 13:15:00 +0000

Type Values Removed Values Added
Description BIND servers that are configured to use TKEY-based authentication via GSS-API tokens are vulnerable to excessive memory consumption when receiving and processing maliciously-constructed packets. Typically these servers will be found in Active Directory integrated DNS deployments and/or Kerberos-secured DNS environments. This issue affects BIND 9 versions 9.0.0 through 9.16.50, 9.18.0 through 9.18.48, 9.20.0 through 9.20.22, 9.21.0 through 9.21.21, 9.9.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.48-S1, and 9.20.9-S1 through 9.20.22-S1.
Title BIND 9 server memory exhaustion during GSS-API TKEY negotiation
First Time appeared Isc
Isc bind
Weaknesses CWE-771
CPEs cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
Vendors & Products Isc
Isc bind
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: isc

Published:

Updated: 2026-05-20T13:43:00.275Z

Reserved: 2026-02-23T16:28:45.411Z

Link: CVE-2026-3039

cve-icon Vulnrichment

Updated: 2026-05-20T13:42:57.276Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-20T13:16:23.647

Modified: 2026-05-20T14:04:57.320

Link: CVE-2026-3039

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T14:45:32Z

Weaknesses