CVE-2020-35857

An issue was discovered in the trust-dns-server crate before 0.18.1 for Rust. DNS MX and SRV null targets are mishandled, causing stack consumption.
Configurations

Configuration 1 (hide)

cpe:2.3:a:trust-dns-server_project:trust-dns-server:*:*:*:*:*:rust:*:*

History

21 Nov 2024, 05:28

Type Values Removed Values Added
References () https://github.com/bluejekyll/trust-dns/commit/8b9eab05795fdc098976262853b2498055c7a8f3 - () https://github.com/bluejekyll/trust-dns/commit/8b9eab05795fdc098976262853b2498055c7a8f3 -
References () https://rustsec.org/advisories/RUSTSEC-2020-0001.html - Exploit, Third Party Advisory () https://rustsec.org/advisories/RUSTSEC-2020-0001.html - Exploit, Third Party Advisory

07 Dec 2023, 22:15

Type Values Removed Values Added
References
  • () https://github.com/bluejekyll/trust-dns/commit/8b9eab05795fdc098976262853b2498055c7a8f3 -

Information

Published : 2020-12-31 10:15

Updated : 2024-11-21 05:28


NVD link : CVE-2020-35857

Mitre link : CVE-2020-35857

CVE.ORG link : CVE-2020-35857


JSON object : View

Products Affected

trust-dns-server_project

  • trust-dns-server
CWE
CWE-400

Uncontrolled Resource Consumption