CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Lifecycle Timeline
5Description
A specially crafted domain can be used to cause a memory leak in a BIND resolver simply by querying this domain. This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1. BIND 9 versions 9.18.0 through 9.18.46 and 9.18.11-S1 through 9.18.46-S1 are NOT affected.
Analysis
Memory exhaustion in BIND 9 resolver allows unauthenticated remote attackers to cause denial of service by querying specially crafted domains, affecting versions 9.20.0-9.20.20, 9.21.0-9.21.19, and 9.20.9-S1-9.20.20-S1. The vulnerability stems from improper memory management (CWE-772) and can be triggered without authentication or user interaction. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Inventory all systems running BIND 9 versions 9.20.0-9.20.20, 9.21.0-9.21.19, and 9.20.9-S1-9.20.20-S1 to identify affected infrastructure. Within 7 days: Apply available patches from ISC to all affected BIND instances. …
Sign in for detailed remediation steps.
Priority Score
Vendor Status
Ubuntu
Priority: Medium| Release | Status | Version |
|---|---|---|
| trusty | not-affected | - |
| xenial | not-affected | - |
| bionic | not-affected | - |
| focal | not-affected | - |
| jammy | not-affected | 1:9.18.39-0ubuntu0.22.04.2 |
| noble | not-affected | 1:9.18.39-0ubuntu0.24.04.2 |
| upstream | released | 9.20.21,9.21.20 |
| questing | released | 1:9.20.11-1ubuntu2.2 |
| Release | Status | Version |
|---|---|---|
| trusty | not-affected | code not present |
| xenial | not-affected | code not present |
| bionic | needs-triage | - |
| focal | not-affected | code not present |
| jammy | not-affected | code not present |
| noble | needs-triage | - |
| questing | needs-triage | - |
| upstream | needs-triage | - |
| Release | Status | Version |
|---|---|---|
| focal | needs-triage | - |
| jammy | needs-triage | - |
| noble | DNE | - |
| questing | DNE | - |
| upstream | needs-triage | - |
Debian
| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| bullseye | vulnerable | 1:9.16.50-1~deb11u2 | - |
| bullseye (security) | vulnerable | 1:9.16.50-1~deb11u4 | - |
| bookworm | vulnerable | 1:9.18.41-1~deb12u1 | - |
| bookworm (security) | vulnerable | 1:9.18.44-1~deb12u1 | - |
| trixie (security), trixie | vulnerable | 1:9.20.18-1~deb13u1 | - |
| forky | vulnerable | 1:9.20.20-1 | - |
| sid | vulnerable | 1:9.20.21-1 | - |
| (unstable) | fixed | (unfixed) | - |
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2026-15410
GHSA-vwv5-298p-pw28