
[CIVN-2026-0171] Multiple Vulnerabilities in ISC BIND
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in ISC BIND
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
ISC BIND versions 9.11.0 through 9.16.50
ISC BIND versions 9.18.0 through 9.18.46
ISC BIND versions 9.20.0 through 9.20.20
ISC BIND versions 9.21.0 through 9.21.19
ISC BIND Supported Preview Edition 9.11.3.S1 through 9.16.50.S1
ISC BIND Supported Preview Edition 9.18.11.S1 through 9.18.46.S1
ISC BIND Supported Preview Edition 9.20.9.S1 through 9.20.20.S1
Note: (Versions prior to 9.11.0 were not assessed.)
Overview
Multiple vulnerabilities have been reported in ISC BIND which could allow a remote attacker to cause CPU exhaustion, which could lead to Denial of Service (DoS), ACL bypass, unauthorized access or memory leak on the targeted system.
Target Audience:
All end-user organizations and individuals using ISC BIND.
Risk Assessment:
Risk of remote code execution, denial of service, unauthorized access and memory leak.
Impact Assessment:
Authoritative servers and Resolvers are affected by these vulnerabilities.
Description
ISC BIND is an open-source software that implements the Domain Name System (DNS) protocols for resolving domain names to IP addresses.
Multiple vulnerabilities exist in ISC BIND which could allow a remote attacker to cause excessive CPU utilization, ACL bypass, unauthorized access and/or memory leak on the targeted server with specially crafted requests.
Successful exploitation of these vulnerabilities could allow a remote attacker to trigger denial of service condition, gain elevated privileges and memory leak on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://kb.isc.org/docs/cve-2026-1519
https://kb.isc.org/docs/cve-2026-3591
https://kb.isc.org/docs/cve-2026-3119
https://kb.isc.org/docs/cve-2026-3104
Vendor Information
ISC BIND
https://kb.isc.org/
References
ISC BIND
https://kb.isc.org/docs/cve-2026-1519
https://kb.isc.org/docs/cve-2026-3591
https://kb.isc.org/docs/cve-2026-3119
https://kb.isc.org/docs/cve-2026-3104
CVE Name
CVE-2026-1519
CVE-2026-3591
CVE-2026-3119
CVE-2026-3104
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=iJi5
—–END PGP SIGNATURE—–


