Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
BIND Updates Address Critical Security Vulnerabilities

BIND Updates Address Critical Security Vulnerabilities

Posted on March 26, 2026 By CWS

The Internet Systems Consortium (ISC) has issued a new set of updates for BIND 9, targeting four security vulnerabilities, two of which are designated as high-severity. This move aims to enhance the security of DNS operations worldwide.

Key Vulnerabilities Addressed

Among the most critical flaws addressed is CVE-2026-3104, a memory leakage issue that affects the preparation of DNSSEC proofs of non-existence. This vulnerability allows malicious domains to trigger a memory leak in BIND resolvers. According to ISC, authoritative servers remain unaffected by this specific bug.

The issue can lead to excessive Resident Set Size (RSS) memory consumption, potentially resulting in an out-of-memory error. Furthermore, the BIND resolver may terminate unexpectedly with an assertion failure when attempting a shutdown or reload.

Impact of the High-Severity Bugs

The second high-severity vulnerability, identified as CVE-2026-1519, can cause a substantial increase in CPU usage. This occurs when the resolver processes a maliciously crafted zone during DNSSEC validation, severely limiting the number of queries the system can handle.

While disabling DNSSEC can prevent this vulnerability’s exploitation, ISC advises against this action as a security measure. Both vulnerabilities can culminate in a Denial of Service (DoS) condition, as highlighted by Ubuntu, which distributes BIND packages to its users.

Patches and Additional Security Fixes

The recent updates also address medium-severity vulnerabilities, including CVE-2026-3119, which may cause unexpected termination of the named process when handling a query with a TKEY record, and CVE-2026-3591, a use-after-return flaw in SIG(0) handling that could allow ACL bypass through crafted DNS requests.

Patches for these vulnerabilities are incorporated in BIND versions 9.18.47, 9.20.21, and 9.21.20, as well as the BIND Supported Preview Edition versions 9.18.47-S1 and 9.20.21-S1. ISC assures that, to date, there are no reports of these vulnerabilities being exploited in real-world attacks. Further details are available on ISC’s software updates page.

Related updates on security patches have also been made by major tech companies for their software, including Cisco, Apple, and Google.

Security Week News Tags:BIND update, CVE-2026-1519, CVE-2026-3104, Cybersecurity, denial of service, DNS software, DNSSEC, ISC, security vulnerabilities, system updates

Post navigation

Previous Post: Unveiling Cyber Deception: Lessons from Art Forgery
Next Post: Torg Grabber Stealer Evolves to Encrypted API C2

Related Posts

‘Whisper Leak’ LLM Side-Channel Attack Infers User Prompt Topics ‘Whisper Leak’ LLM Side-Channel Attack Infers User Prompt Topics Security Week News
OpenAI’s Sam Altman Warns of AI Voice Fraud Crisis in Banking OpenAI’s Sam Altman Warns of AI Voice Fraud Crisis in Banking Security Week News
The UK Brings Cyberwarfare Out of the Closet The UK Brings Cyberwarfare Out of the Closet Security Week News
Trump Signs Executive Order to Block State AI Regulations Trump Signs Executive Order to Block State AI Regulations Security Week News
Defend Against Identity Threats: Join Our Webinar Defend Against Identity Threats: Join Our Webinar Security Week News
Defakto Raises  Million for Non-Human IAM Platform Defakto Raises $30 Million for Non-Human IAM Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • GhostClaw Malware Targets macOS Users with AI Tools
  • China-Linked Group Uses BPFDoor to Spy on Telecoms
  • Critical IDrive Windows Flaw Allows Privilege Escalation
  • CISA Highlights Exploited Langflow Code Injection Flaw
  • Cisco Addresses Critical IOS Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • GhostClaw Malware Targets macOS Users with AI Tools
  • China-Linked Group Uses BPFDoor to Spy on Telecoms
  • Critical IDrive Windows Flaw Allows Privilege Escalation
  • CISA Highlights Exploited Langflow Code Injection Flaw
  • Cisco Addresses Critical IOS Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark