CVE-2026-3104: CWE-772 Missing Release of Resource after Effective Lifetime in ISC BIND 9
A specially crafted domain can be used to cause a memory leak in a BIND resolver simply by querying this domain. This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1. BIND 9 versions 9.18.0 through 9.18.46 and 9.18.11-S1 through 9.18.46-S1 are NOT affected.
AI Analysis
Technical Summary
CVE-2026-3104 is a vulnerability identified in ISC BIND 9, a widely deployed DNS server and resolver software. The issue stems from CWE-772, which involves the missing release of a resource after its effective lifetime, specifically a memory leak triggered by handling certain DNS queries. When a specially crafted domain name is queried, the BIND resolver fails to free allocated memory properly, causing a gradual increase in memory consumption. This affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and the corresponding S1 patch series. The flaw does not impact versions 9.18.x or earlier. The vulnerability can be exploited remotely without any authentication or user interaction, as it only requires sending DNS queries to the vulnerable resolver. The CVSS v3.1 score of 7.5 reflects the high impact on availability due to potential denial of service from resource exhaustion, while confidentiality and integrity remain unaffected. No patches were linked at the time of disclosure, and no active exploitation has been reported, but the risk remains significant given the critical role of BIND in DNS infrastructure worldwide.
Potential Impact
The primary impact of CVE-2026-3104 is on the availability of DNS services running vulnerable BIND versions. Exploitation leads to a memory leak that can cause the DNS resolver to consume excessive memory, eventually resulting in degraded performance or a crash. This can cause denial of service conditions, disrupting domain name resolution for affected organizations. Since DNS is foundational to internet and intranet operations, such disruptions can cascade into broader service outages, affecting web services, email, and other critical applications. The vulnerability does not compromise confidentiality or integrity directly but poses a significant operational risk. Organizations with internet-facing DNS resolvers or internal DNS infrastructure running affected BIND versions are at risk of targeted or opportunistic attacks aiming to degrade or disrupt their DNS services. This can be particularly damaging for ISPs, cloud providers, enterprises, and government agencies that rely heavily on stable DNS resolution.
Mitigation Recommendations
Organizations should immediately inventory their DNS infrastructure to identify BIND 9 versions in the affected ranges (9.20.0-9.20.20, 9.21.0-9.21.19, and 9.20.9-S1 through 9.20.20-S1). Until patches are released, consider temporarily downgrading to unaffected versions such as 9.18.x if feasible and compatible. Monitor DNS query logs for unusual or suspicious domain queries that could trigger the memory leak. Implement rate limiting or query filtering on DNS resolvers to restrict queries from untrusted sources or limit query types that might exploit the vulnerability. Employ resource monitoring and alerting to detect abnormal memory usage patterns in DNS servers. Network segmentation and firewall rules can help restrict external access to internal DNS resolvers. Once ISC releases patches, apply them promptly and validate the update. Additionally, consider deploying DNS resolver redundancy and failover mechanisms to minimize service disruption in case of exploitation attempts.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, China, India, Canada, Australia, Netherlands, Brazil, Russia, Singapore, Israel
CVE-2026-3104: CWE-772 Missing Release of Resource after Effective Lifetime in ISC BIND 9
Description
A specially crafted domain can be used to cause a memory leak in a BIND resolver simply by querying this domain. This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1. BIND 9 versions 9.18.0 through 9.18.46 and 9.18.11-S1 through 9.18.46-S1 are NOT affected.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-3104 is a vulnerability identified in ISC BIND 9, a widely deployed DNS server and resolver software. The issue stems from CWE-772, which involves the missing release of a resource after its effective lifetime, specifically a memory leak triggered by handling certain DNS queries. When a specially crafted domain name is queried, the BIND resolver fails to free allocated memory properly, causing a gradual increase in memory consumption. This affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and the corresponding S1 patch series. The flaw does not impact versions 9.18.x or earlier. The vulnerability can be exploited remotely without any authentication or user interaction, as it only requires sending DNS queries to the vulnerable resolver. The CVSS v3.1 score of 7.5 reflects the high impact on availability due to potential denial of service from resource exhaustion, while confidentiality and integrity remain unaffected. No patches were linked at the time of disclosure, and no active exploitation has been reported, but the risk remains significant given the critical role of BIND in DNS infrastructure worldwide.
Potential Impact
The primary impact of CVE-2026-3104 is on the availability of DNS services running vulnerable BIND versions. Exploitation leads to a memory leak that can cause the DNS resolver to consume excessive memory, eventually resulting in degraded performance or a crash. This can cause denial of service conditions, disrupting domain name resolution for affected organizations. Since DNS is foundational to internet and intranet operations, such disruptions can cascade into broader service outages, affecting web services, email, and other critical applications. The vulnerability does not compromise confidentiality or integrity directly but poses a significant operational risk. Organizations with internet-facing DNS resolvers or internal DNS infrastructure running affected BIND versions are at risk of targeted or opportunistic attacks aiming to degrade or disrupt their DNS services. This can be particularly damaging for ISPs, cloud providers, enterprises, and government agencies that rely heavily on stable DNS resolution.
Mitigation Recommendations
Organizations should immediately inventory their DNS infrastructure to identify BIND 9 versions in the affected ranges (9.20.0-9.20.20, 9.21.0-9.21.19, and 9.20.9-S1 through 9.20.20-S1). Until patches are released, consider temporarily downgrading to unaffected versions such as 9.18.x if feasible and compatible. Monitor DNS query logs for unusual or suspicious domain queries that could trigger the memory leak. Implement rate limiting or query filtering on DNS resolvers to restrict queries from untrusted sources or limit query types that might exploit the vulnerability. Employ resource monitoring and alerting to detect abnormal memory usage patterns in DNS servers. Network segmentation and firewall rules can help restrict external access to internal DNS resolvers. Once ISC releases patches, apply them promptly and validate the update. Additionally, consider deploying DNS resolver redundancy and failover mechanisms to minimize service disruption in case of exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- isc
- Date Reserved
- 2026-02-24T10:04:57.917Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c3eaa6f4197a8e3b5259ea
Added to database: 3/25/2026, 2:01:10 PM
Last enriched: 3/25/2026, 2:16:13 PM
Last updated: 3/26/2026, 5:31:51 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.