<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ISC — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/isc/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 13:22:34 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/isc/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-3039: BIND TKEY Authentication Memory Consumption Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-3039-bind-memory-consumption/</link><pubDate>Wed, 20 May 2026 13:22:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-3039-bind-memory-consumption/</guid><description>BIND servers configured for TKEY-based authentication using GSS-API tokens are susceptible to excessive memory consumption upon receiving and processing crafted packets, impacting availability.</description><content:encoded><![CDATA[<p>ISC BIND 9 is vulnerable to excessive memory consumption (CVE-2026-3039) when processing maliciously crafted packets targeting servers using TKEY-based authentication via GSS-API tokens. This configuration is often found in Active Directory-integrated DNS deployments or Kerberos-secured DNS environments. An attacker can exploit this vulnerability by sending specially crafted packets, causing the BIND server to consume excessive memory resources, potentially leading to denial of service. The affected versions include BIND 9 versions 9.0.0 through 9.16.50, 9.18.0 through 9.18.48, 9.20.0 through 9.20.22, 9.21.0 through 9.21.21, 9.9.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.48-S1, and 9.20.9-S1 through 9.20.22-S1. Defenders should monitor DNS server memory usage and implement rate limiting or packet filtering to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a BIND server configured to use TKEY-based authentication with GSS-API.</li>
<li>The attacker crafts a malicious DNS packet specifically designed to exploit the memory consumption vulnerability.</li>
<li>The attacker sends the crafted packet to the vulnerable BIND server.</li>
<li>The BIND server receives the packet and attempts to process the TKEY authentication.</li>
<li>Due to the malicious structure of the packet, the server allocates an excessive amount of memory during the authentication process.</li>
<li>The attacker repeats steps 3-5, sending multiple crafted packets to continually exhaust server memory.</li>
<li>The BIND server&rsquo;s memory consumption increases significantly, impacting performance and stability.</li>
<li>The BIND server eventually crashes due to memory exhaustion, resulting in a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3039 leads to excessive memory consumption on the affected BIND server, potentially resulting in a denial-of-service condition. This can disrupt DNS resolution services for the affected domain or network, impacting users&rsquo; ability to access websites and online services. The vulnerability poses a significant risk to organizations relying on Active Directory-integrated DNS or Kerberos-secured DNS environments, potentially causing widespread service outages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade BIND 9 to a patched version beyond 9.16.50, 9.18.48, 9.20.22, or 9.21.21 to remediate CVE-2026-3039.</li>
<li>Implement rate limiting on DNS traffic to mitigate the impact of malicious packets, protecting against memory exhaustion.</li>
<li>Monitor DNS server memory usage for unexpected spikes using system monitoring tools.</li>
<li>Deploy the Sigma rule <code>Detect Excessive DNS Server Memory Allocation</code> to identify potential exploitation attempts.</li>
<li>Review DNS server configurations to minimize the use of TKEY-based authentication where possible.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>cve-2026-3039</category><category>bind9</category><category>denial-of-service</category><category>memory-consumption</category></item><item><title>ISC BIND Use-After-Free Vulnerability Due to Race Condition (CVE-2026-5947)</title><link>https://feed.craftedsignal.io/briefs/2026-05-isc-bind-uaf/</link><pubDate>Wed, 20 May 2026 13:20:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-isc-bind-uaf/</guid><description>A race condition in ISC BIND can lead to a use-after-free vulnerability (CVE-2026-5947) when handling SIG(0) signed DNS messages, potentially leading to undefined behavior.</description><content:encoded><![CDATA[<p>A use-after-free vulnerability, tracked as CVE-2026-5947, exists in ISC BIND. Specifically, when BIND receives an incoming DNS message signed with SIG(0), it validates that signature. If the number of &ldquo;recursive-clients&rdquo; reaches the configured limit during this validation process due to a query flood, the DNS message may be discarded. However, a small window of time exists where the SIG(0) validation process might still attempt to read the now-discarded DNS message, leading to a use-after-free condition and undefined behavior. This issue affects BIND 9 versions 9.20.0 through 9.20.22, 9.21.0 through 9.21.21, and 9.20.9-S1 through 9.20.22-S1. BIND 9 versions 9.18.28 through 9.18.49 and 9.18.28-S1 through 9.18.49-S1 are not affected.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker sends a DNS query flood to a BIND server to exhaust the <code>recursive-clients</code> limit.</li>
<li>Simultaneously, the attacker sends a crafted DNS message signed with SIG(0).</li>
<li>The BIND server receives the crafted DNS message and begins SIG(0) signature validation.</li>
<li>While the signature validation is in progress, the <code>recursive-clients</code> limit is reached due to the query flood.</li>
<li>The BIND server discards the DNS message to enforce the <code>recursive-clients</code> limit.</li>
<li>The SIG(0) validation routine attempts to read the discarded DNS message.</li>
<li>A use-after-free vulnerability is triggered because the memory associated with the DNS message has been freed.</li>
<li>This can lead to undefined behavior, potentially causing the BIND server to crash or, in more severe cases, allow for remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5947 can cause a denial-of-service (DoS) condition on the affected BIND server, disrupting DNS resolution services. In a worst-case scenario, it could lead to remote code execution, potentially allowing an attacker to gain control of the server. Given the critical role of DNS servers in network infrastructure, this vulnerability poses a significant risk. While no specific victim counts are available, the widespread use of BIND makes many organizations vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of BIND 9 to address CVE-2026-5947. Versions 9.18.28 through 9.18.49 and 9.18.28-S1 through 9.18.49-S1 are not affected.</li>
<li>Monitor DNS server logs for errors related to SIG(0) validation, which may indicate exploitation attempts. Deploy the Sigma rule <code>Detect SIG(0) validation failure</code> to detect these events.</li>
<li>Rate limit incoming DNS queries to prevent query floods and reduce the likelihood of triggering the <code>recursive-clients</code> limit and the race condition.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>dns</category><category>use-after-free</category><category>denial-of-service</category></item><item><title>CVE-2026-5946: BIND 9 `named` Assertion Failure Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-5946-bind9-assertion-failure/</link><pubDate>Wed, 20 May 2026 13:19:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-5946-bind9-assertion-failure/</guid><description>Multiple flaws in BIND 9's `named` component, specifically versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.48, 9.20.0 through 9.20.22, 9.21.0 through 9.21.21, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.48-S1, and 9.20.9-S1 through 9.20.22-S1, can be exploited by sending specially crafted DNS requests with non-`IN` CLASS or meta-classes, leading to assertion failures and potential denial-of-service.</description><content:encoded><![CDATA[<p>CVE-2026-5946 identifies multiple vulnerabilities within the <code>named</code> component of BIND 9, arising from improper handling of DNS messages employing a CLASS other than Internet (<code>IN</code>), such as <code>CHAOS</code> or <code>HESIOD</code>, or DNS messages with meta-classes (<code>ANY</code> or <code>NONE</code>) in the question section. An attacker can trigger these flaws by sending specially crafted DNS requests to a vulnerable BIND 9 server. The affected code paths include recursion, dynamic updates (<code>UPDATE</code>), zone change notifications (<code>NOTIFY</code>), and processing of <code>IN</code>-specific record types within non-<code>IN</code> data. Successful exploitation can lead to assertion failures in <code>named</code>, potentially causing a denial-of-service condition. The vulnerability impacts BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.48, 9.20.0 through 9.20.22, 9.21.0 through 9.21.21, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.48-S1, and 9.20.9-S1 through 9.20.22-S1.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable BIND 9 server.</li>
<li>The attacker crafts a malicious DNS request. This request leverages a DNS CLASS other than <code>IN</code>, such as <code>CHAOS</code>, or includes meta-classes such as <code>ANY</code> or <code>NONE</code> in the question section.</li>
<li>The attacker sends the crafted DNS request to the target BIND 9 server.</li>
<li>The <code>named</code> process receives and parses the malicious DNS request.</li>
<li>Due to the unexpected CLASS or meta-class, the <code>named</code> process enters a vulnerable code path during recursion, dynamic updates, zone change notifications, or processing of <code>IN</code>-specific record types in non-<code>IN</code> data.</li>
<li>Within the vulnerable code path, the <code>named</code> process attempts an invalid operation based on the malicious request.</li>
<li>This invalid operation triggers an assertion failure within the <code>named</code> process.</li>
<li>The assertion failure may cause the <code>named</code> process to terminate or become unstable, resulting in a denial-of-service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5946 leads to assertion failures within the <code>named</code> process, causing potential instability or termination of the service. This results in a denial-of-service condition, disrupting DNS resolution services for affected networks and users. The severity of the impact depends on the role of the affected BIND 9 server; critical infrastructure DNS servers experiencing this issue can cause widespread outages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade BIND 9 to a patched version (&gt;= 9.16.51, &gt;= 9.18.49, &gt;= 9.20.23, &gt;= 9.21.22) to remediate CVE-2026-5946.</li>
<li>Deploy the Sigma rule &ldquo;Detect DNS queries with non-IN class&rdquo; to identify potentially malicious DNS requests targeting this vulnerability.</li>
<li>Monitor DNS server logs for assertion failures in the <code>named</code> process, which may indicate exploitation attempts related to CVE-2026-5946.</li>
<li>Consider implementing rate limiting and request filtering to mitigate the impact of malicious DNS requests.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>dns</category><category>bind9</category><category>CVE-2026-5946</category></item></channel></rss>