logo

CVE-2020-35857 trust-dns-server

Package

Manager: cargo
Name: trust-dns-server
Vulnerable Version: >=0.16.0 <0.18.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00334 pctl0.55653

Details

Stack consumption in trust-dns-server There's a stack overflow leading to a crash and potential DOS when processing additional records for return of MX or SRV record types from the server. This is only possible when a zone is configured with a null target for MX or SRV records. Prior to 0.16.0 the additional record processing was not supported by trust-dns-server. There Are no known issues with upgrading from 0.16 or 0.17 to 0.18.1. The remidy should be to upgrade to 0.18.1. If unable to do so, MX, SRV or other record types with a target to the null type, should be avoided.

Metadata

Created: 2021-08-25T20:46:13Z
Modified: 2023-12-08T19:31:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/08/GHSA-4cww-f7w5-x525/GHSA-4cww-f7w5-x525.json
CWE IDs: ["CWE-400"]
Alternative ID: GHSA-4cww-f7w5-x525
Finding: F002
Auto approve: 1