VYPR
Medium severity5.3NVD Advisory· Published May 20, 2026· Updated May 20, 2026

CVE-2026-5950

CVE-2026-5950

Description

An unbounded resend loop vulnerability exists in the BIND 9 resolver state machine during bad-server handling, enabling a remote unauthenticated attacker to cause severe resource exhaustion by sending queries that trigger specific retry conditions. This issue affects BIND 9 versions 9.18.36 through 9.18.48, 9.20.8 through 9.20.22, 9.21.7 through 9.21.21, 9.18.36-S1 through 9.18.48-S1, and 9.20.9-S1 through 9.20.22-S1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unbounded resend loop in BIND 9 resolver's bad-server handling allows a remote unauthenticated attacker to cause severe resource exhaustion.

Vulnerability

An unbounded resend loop vulnerability exists in the BIND 9 resolver state machine during bad-server handling. When a resolver receives queries that trigger specific retry conditions, it enters an infinite loop of resending queries to a misbehaving server, leading to severe resource exhaustion. This affects BIND 9 versions 9.18.36 through 9.18.48, 9.20.8 through 9.20.22, 9.21.7 through 9.21.21, and the corresponding Supported Preview Edition versions 9.18.36-S1 through 9.18.48-S1 and 9.20.9-S1 through 9.20.22-S1 [1]. Authoritative services are believed to be unaffected [1].

Exploitation

A remote unauthenticated attacker can exploit this vulnerability by sending crafted DNS queries to a vulnerable resolver. No authentication or prior access is required. The attacker triggers the bad-server handling code path, causing the resolver to repeatedly resend queries in an unbounded loop, consuming CPU and memory resources [1]. No user interaction is needed.

Impact

Successful exploitation results in severe resource exhaustion on the affected resolver, leading to denial of service (DoS). The resolver may become unresponsive or crash, disrupting DNS resolution for legitimate clients. The vulnerability does not allow data compromise or privilege escalation; the impact is limited to availability [1].

Mitigation

ISC has released patched versions on 20 May 2026: 9.18.49, 9.20.23, and 9.21.22 for the main branch, and 9.18.49-S1 and 9.20.23-S1 for the Supported Preview Edition [1]. These are available for download from the ISC website [2][3][4]. No workarounds are known [1]. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities catalog as of publication.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Range: >=9.18.36,<=9.18.48 || >=9.20.8,<=9.20.22 || >=9.21.7,<=9.21.21 || >=9.18.36-S1,<=9.18.48-S1 || >=9.20.9-S1,<=9.20.22-S1
  • Isc/Bindllm-fuzzy
    Range: 9.18.36 through 9.18.48, 9.20.8 through 9.20.22, 9.21.7 through 9.21.21, 9.18.36-S1 through 9.18.48-S1, 9.20.9-S1 through 9.20.22-S1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.