Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-3039
PUBLISHED
More InfoOfficial Page
Assigner-isc
Assigner Org ID-404fd4d2-a609-4245-b543-2c944a302a22
View Known Exploited Vulnerability (KEV) details
Published At-20 May, 2026 | 13:09
Updated At-20 May, 2026 | 13:43
Rejected At-
▼CVE Numbering Authority (CNA)
BIND 9 server memory exhaustion during GSS-API TKEY negotiation

BIND servers that are configured to use TKEY-based authentication via GSS-API tokens are vulnerable to excessive memory consumption when receiving and processing maliciously-constructed packets. Typically these servers will be found in Active Directory integrated DNS deployments and/or Kerberos-secured DNS environments. This issue affects BIND 9 versions 9.0.0 through 9.16.50, 9.18.0 through 9.18.48, 9.20.0 through 9.20.22, 9.21.0 through 9.21.21, 9.9.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.48-S1, and 9.20.9-S1 through 9.20.22-S1.

Affected Products
Vendor
Internet Systems Consortium, Inc.ISC
Product
BIND 9
Default Status
unaffected
Versions
Affected
  • From 9.0.0 through 9.16.50 (custom)
  • From 9.18.0 through 9.18.48 (custom)
  • From 9.20.0 through 9.20.22 (custom)
  • From 9.21.0 through 9.21.21 (custom)
  • From 9.9.3-S1 through 9.16.50-S1 (custom)
  • From 9.18.11-S1 through 9.18.48-S1 (custom)
  • From 9.20.9-S1 through 9.20.22-S1 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-771CWE-771 Missing Reference to Active Allocated Resource
Type: CWE
CWE ID: CWE-771
Description: CWE-771 Missing Reference to Active Allocated Resource
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
N/AAn attacker can construct and send packets to a BIND server that will cause it to allocate memory that is not subsequently released. Depending on the volume and frequency of the packets received, named will eventually fail due to memory exhaustion.
CAPEC ID: N/A
Description: An attacker can construct and send packets to a BIND server that will cause it to allocate memory that is not subsequently released. Depending on the volume and frequency of the packets received, named will eventually fail due to memory exhaustion.
Solutions

Upgrade to the patched release most closely related to your current version of BIND 9: 9.18.49, 9.20.23, 9.21.22, 9.18.49-S1, or 9.20.23-S1.

Configurations

Workarounds

No workarounds known.

Exploits

We are not aware of any active exploits.

Credits

ISC would like to thank Vitaly Simonovich for bringing this vulnerability to our attention.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://kb.isc.org/docs/cve-2026-3039
vendor-advisory
https://downloads.isc.org/isc/bind9/9.18.49
patch
https://downloads.isc.org/isc/bind9/9.20.23
patch
https://downloads.isc.org/isc/bind9/9.21.22
patch
Hyperlink: https://kb.isc.org/docs/cve-2026-3039
Resource:
vendor-advisory
Hyperlink: https://downloads.isc.org/isc/bind9/9.18.49
Resource:
patch
Hyperlink: https://downloads.isc.org/isc/bind9/9.20.23
Resource:
patch
Hyperlink: https://downloads.isc.org/isc/bind9/9.21.22
Resource:
patch
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found