PT-2026-27775 · Isc · Bind
Published
2026-03-25
·
Updated
2026-03-25
·
CVE-2026-3591
CVSS v3.1
5.4
Medium
| AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
Name of the Vulnerable Software and Affected Versions
BIND versions 9.20.0 through 9.20.20
BIND versions 9.21.0 through 9.21.19
BIND versions 9.20.9-S1 through 9.20.20-S1
Description
A use-after-return issue exists in the
named server when processing DNS queries signed with SIG(0). A crafted DNS request could cause an Access Control List (ACL) to incorrectly match an IP address. In a default-allow ACL, this may result in unauthorized access.Recommendations
Update BIND to a version later than 9.20.20.
Update BIND to a version later than 9.21.19.
Update BIND to a version later than 9.20.20-S1.
Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Bind