Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3104: CWE-772 Missing Release of Resource after Effective Lifetime in ISC BIND 9

0
High
VulnerabilityCVE-2026-3104cvecve-2026-3104cwe-772
Published: Wed Mar 25 2026 (03/25/2026, 13:29:19 UTC)
Source: CVE Database V5
Vendor/Project: ISC
Product: BIND 9

Description

A specially crafted domain can be used to cause a memory leak in a BIND resolver simply by querying this domain. This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1. BIND 9 versions 9.18.0 through 9.18.46 and 9.18.11-S1 through 9.18.46-S1 are NOT affected.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 14:16:13 UTC

Technical Analysis

CVE-2026-3104 is a vulnerability identified in ISC BIND 9, a widely deployed DNS server and resolver software. The issue stems from CWE-772, which involves the missing release of a resource after its effective lifetime, specifically a memory leak triggered by handling certain DNS queries. When a specially crafted domain name is queried, the BIND resolver fails to free allocated memory properly, causing a gradual increase in memory consumption. This affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and the corresponding S1 patch series. The flaw does not impact versions 9.18.x or earlier. The vulnerability can be exploited remotely without any authentication or user interaction, as it only requires sending DNS queries to the vulnerable resolver. The CVSS v3.1 score of 7.5 reflects the high impact on availability due to potential denial of service from resource exhaustion, while confidentiality and integrity remain unaffected. No patches were linked at the time of disclosure, and no active exploitation has been reported, but the risk remains significant given the critical role of BIND in DNS infrastructure worldwide.

Potential Impact

The primary impact of CVE-2026-3104 is on the availability of DNS services running vulnerable BIND versions. Exploitation leads to a memory leak that can cause the DNS resolver to consume excessive memory, eventually resulting in degraded performance or a crash. This can cause denial of service conditions, disrupting domain name resolution for affected organizations. Since DNS is foundational to internet and intranet operations, such disruptions can cascade into broader service outages, affecting web services, email, and other critical applications. The vulnerability does not compromise confidentiality or integrity directly but poses a significant operational risk. Organizations with internet-facing DNS resolvers or internal DNS infrastructure running affected BIND versions are at risk of targeted or opportunistic attacks aiming to degrade or disrupt their DNS services. This can be particularly damaging for ISPs, cloud providers, enterprises, and government agencies that rely heavily on stable DNS resolution.

Mitigation Recommendations

Organizations should immediately inventory their DNS infrastructure to identify BIND 9 versions in the affected ranges (9.20.0-9.20.20, 9.21.0-9.21.19, and 9.20.9-S1 through 9.20.20-S1). Until patches are released, consider temporarily downgrading to unaffected versions such as 9.18.x if feasible and compatible. Monitor DNS query logs for unusual or suspicious domain queries that could trigger the memory leak. Implement rate limiting or query filtering on DNS resolvers to restrict queries from untrusted sources or limit query types that might exploit the vulnerability. Employ resource monitoring and alerting to detect abnormal memory usage patterns in DNS servers. Network segmentation and firewall rules can help restrict external access to internal DNS resolvers. Once ISC releases patches, apply them promptly and validate the update. Additionally, consider deploying DNS resolver redundancy and failover mechanisms to minimize service disruption in case of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
isc
Date Reserved
2026-02-24T10:04:57.917Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c3eaa6f4197a8e3b5259ea

Added to database: 3/25/2026, 2:01:10 PM

Last enriched: 3/25/2026, 2:16:13 PM

Last updated: 3/26/2026, 5:31:51 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses