An issue was discovered in the trust-dns-server crate before 0.18.1 for Rust. DNS MX and SRV null targets are mishandled, causing stack consumption.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/bluejekyll/trust-dns/commit/8b9eab05795fdc098976262853b2498055c7a8f3 | |
| https://rustsec.org/advisories/RUSTSEC-2020-0001.html | Exploit Third Party Advisory | 
| https://github.com/bluejekyll/trust-dns/commit/8b9eab05795fdc098976262853b2498055c7a8f3 | |
| https://rustsec.org/advisories/RUSTSEC-2020-0001.html | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 05:28
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/bluejekyll/trust-dns/commit/8b9eab05795fdc098976262853b2498055c7a8f3 - | |
| References | () https://rustsec.org/advisories/RUSTSEC-2020-0001.html - Exploit, Third Party Advisory | 
07 Dec 2023, 22:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
Information
                Published : 2020-12-31 10:15
Updated : 2024-11-21 05:28
NVD link : CVE-2020-35857
Mitre link : CVE-2020-35857
CVE.ORG link : CVE-2020-35857
JSON object : View
Products Affected
                trust-dns-server_project
- trust-dns-server
CWE
                
                    
                        
                        CWE-400
                        
            Uncontrolled Resource Consumption
