BIND servers that are configured to use TKEY-based authentication via GSS-API tokens are vulnerable to excessive memory consumption when receiving and processing maliciously-constructed packets. Typically these servers will be found in Active Directory integrated DNS deployments and/or Kerberos-secured DNS environments.
This issue affects BIND 9 versions 9.0.0 through 9.16.50, 9.18.0 through 9.18.48, 9.20.0 through 9.20.22, 9.21.0 through 9.21.21, 9.9.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.48-S1, and 9.20.9-S1 through 9.20.22-S1.
Metrics
Affected Vendors & Products
References
History
Wed, 20 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | BIND servers that are configured to use TKEY-based authentication via GSS-API tokens are vulnerable to excessive memory consumption when receiving and processing maliciously-constructed packets. Typically these servers will be found in Active Directory integrated DNS deployments and/or Kerberos-secured DNS environments. This issue affects BIND 9 versions 9.0.0 through 9.16.50, 9.18.0 through 9.18.48, 9.20.0 through 9.20.22, 9.21.0 through 9.21.21, 9.9.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.48-S1, and 9.20.9-S1 through 9.20.22-S1. | |
| Title | BIND 9 server memory exhaustion during GSS-API TKEY negotiation | |
| First Time appeared |
Isc
Isc bind |
|
| Weaknesses | CWE-771 | |
| CPEs | cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Isc
Isc bind |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: isc
Published:
Updated: 2026-05-20T13:43:00.275Z
Reserved: 2026-02-23T16:28:45.411Z
Link: CVE-2026-3039
Updated: 2026-05-20T13:42:57.276Z
Status : Awaiting Analysis
Published: 2026-05-20T13:16:23.647
Modified: 2026-05-20T14:04:57.320
Link: CVE-2026-3039
No data.
OpenCVE Enrichment
Updated: 2026-05-20T14:45:32Z