CVE-2026-5946 PUBLISHED

Invalid handling of CLASS != IN

Assigner: isc
Reserved: 09.04.2026 Published: 20.05.2026 Updated: 20.05.2026

Multiple flaws have been identified in named related to the handling of DNS messages whose CLASS is not Internet (IN) — for example, CHAOS or HESIOD, or DNS messages that specify meta-classes (ANY or NONE) in the question section. Specially crafted requests reaching the affected code paths — recursion, dynamic updates (UPDATE), zone change notifications (NOTIFY), or processing of IN-specific record types in non-IN data — can cause assertion failures in named. This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.48, 9.20.0 through 9.20.22, 9.21.0 through 9.21.21, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.48-S1, and 9.20.9-S1 through 9.20.22-S1.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS Score: 7.5

Product Status

Vendor ISC
Product BIND 9
Versions Default: unaffected
  • affected from 9.11.0 to 9.16.50 (incl.)
  • affected from 9.18.0 to 9.18.48 (incl.)
  • affected from 9.20.0 to 9.20.22 (incl.)
  • affected from 9.21.0 to 9.21.21 (incl.)
  • affected from 9.11.3-S1 to 9.16.50-S1 (incl.)
  • affected from 9.18.11-S1 to 9.18.48-S1 (incl.)
  • affected from 9.20.9-S1 to 9.20.22-S1 (incl.)

Exploits

We are not aware of any active exploits.

Workarounds

Don't configure zones other than Internet (IN) class. Furthermore, do not expose the server that allows DNS Dynamic Update to the general Internet.

Solutions

Upgrade to the patched release most closely related to your current version of BIND 9: 9.18.49, 9.20.23, 9.21.22, 9.18.49-S1, or 9.20.23-S1.

Credits

  • ISC would like to thank Mcsky23 for bringing this vulnerability to our attention.

References

Problem Types

  • CWE-20 Improper Input Validation CWE
  • CWE-125 Out-of-bounds Read CWE
  • CWE-617 Reachable Assertion CWE
  • CWE-754 Improper Check for Unusual or Exceptional Conditions CWE
  • CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') CWE

Impacts

  • An attacker able to send specially crafted DNS messages to an affected `named` instance can cause it to terminate unexpectedly, resulting in a denial of service.