An issue was discovered in the trust-dns-server crate before 0.18.1 for Rust. DNS MX and SRV null targets are mishandled, causing stack consumption.
References
Link | Resource |
---|---|
https://github.com/bluejekyll/trust-dns/commit/8b9eab05795fdc098976262853b2498055c7a8f3 | |
https://rustsec.org/advisories/RUSTSEC-2020-0001.html | Exploit Third Party Advisory |
https://github.com/bluejekyll/trust-dns/commit/8b9eab05795fdc098976262853b2498055c7a8f3 | |
https://rustsec.org/advisories/RUSTSEC-2020-0001.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/bluejekyll/trust-dns/commit/8b9eab05795fdc098976262853b2498055c7a8f3 - | |
References | () https://rustsec.org/advisories/RUSTSEC-2020-0001.html - Exploit, Third Party Advisory |
07 Dec 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2020-12-31 10:15
Updated : 2024-11-21 05:28
NVD link : CVE-2020-35857
Mitre link : CVE-2020-35857
CVE.ORG link : CVE-2020-35857
JSON object : View
Products Affected
trust-dns-server_project
- trust-dns-server
CWE
CWE-400
Uncontrolled Resource Consumption