Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTRjd3ctZjd3NS14NTI1

Stack consumption in trust-dns-server

There's a stack overflow leading to a crash and potential DOS when processing additional records for return of MX or SRV record types from the server. This is only possible when a zone is configured with a null target for MX or SRV records. Prior to 0.16.0 the additional record processing was not supported by trust-dns-server. There Are no known issues with upgrading from 0.16 or 0.17 to 0.18.1. The remidy should be to upgrade to 0.18.1. If unable to do so, MX, SRV or other record types with a target to the null type, should be avoided.

Permalink: https://github.com/advisories/GHSA-4cww-f7w5-x525
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTRjd3ctZjd3NS14NTI1
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: 5 months ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Identifiers: GHSA-4cww-f7w5-x525, CVE-2020-35857
References: Repository: https://github.com/bluejekyll/trust-dns
Blast Radius: 16.7

Affected Packages

cargo:trust-dns-server
Dependent packages: 30
Dependent repositories: 167
Downloads: 808,677 total
Affected Version Ranges: >= 0.16.0, < 0.18.1
Fixed in: 0.18.1
All affected versions: 0.16.0, 0.16.1, 0.17.0, 0.18.0
All unaffected versions: 0.9.0, 0.9.3, 0.10.0, 0.10.1, 0.10.2, 0.10.3, 0.10.5, 0.10.6, 0.10.7, 0.10.8, 0.12.0, 0.13.0, 0.14.0, 0.15.0, 0.15.1, 0.18.1, 0.19.0, 0.19.1, 0.19.2, 0.19.3, 0.19.4, 0.19.5, 0.19.6, 0.19.7, 0.20.0, 0.20.1, 0.20.2, 0.20.3, 0.20.4, 0.21.0, 0.21.1, 0.21.2, 0.22.0, 0.22.1, 0.23.0, 0.23.1, 0.23.2