Impact
BIND 9's named daemon may crash when processing a correctly signed query that contains a TKEY record. The flaw is triggered only when the query includes a valid TSIG signature from a key defined in the server’s configuration. The crash results in a sudden termination of the named process, leading to a denial of service for DNS resolution on the affected system.
Affected Systems
ISC:BIND 9 releases 9.20.0–9.20.20, 9.21.0–9.21.19, and 9.20.9-S1–9.20.20-S1 are affected. Earlier 9.18.x releases are not impacted.
Risk and Exploitability
The CVSS score of 6.5 indicates medium severity. Because an attacker needs to send a DNS query signed with a TSIG key that the server trusts, the likelihood of exploitation depends on how many unnecessary TSIG keys are present. Successful exploitation would briefly disrupt DNS services on the affected host. The vulnerability is not listed in the CISA KEV catalog, and no EPSS score is available.
OpenCVE Enrichment
Debian DSA
Ubuntu USN