CVE-2020-35857

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-35857
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-35857.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-35857
Aliases
Withdrawn
2024-11-13T01:38:00.988180Z
Published
2020-12-31T10:15:14Z
Modified
2024-05-14T08:09:42.752028Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in the trust-dns-server crate before 0.18.1 for Rust. DNS MX and SRV null targets are mishandled, causing stack consumption.

References

Affected packages

Git / github.com/bluejekyll/trust-dns

Affected ranges

Type
GIT
Repo
https://github.com/bluejekyll/trust-dns
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/hickory-dns/hickory-dns
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.1.0
0.10.0
0.10.1
0.10.2
0.10.3
0.10.4
0.10.5
0.11.0
0.18.0.alpha.2
0.2.0
0.2.1
0.3.0
0.3.1
0.4.0
0.5.0
0.5.1
0.5.3
0.6.0
0.7.0
0.7.1
0.7.2
0.7.3
0.8.0
0.8.1
0.9.0
0.9.1
0.9.2
0.9.3

c0.*

c0.12.0

cs0.*

cs0.15.0
cs0.16
cs0.16.1

r0.*

r0.10.0
r0.11
r0.11.1
r0.12_cs0.17
r0.5.0
r0.6.0
r0.7.0
r0.8.0
r0.8.1
r0.9.0

resolver.*

resolver.0.4.0

v0.*

v0.13.0
v0.14.0