GHSA-4cww-f7w5-x525

Suggest an improvement
Source
https://github.com/advisories/GHSA-4cww-f7w5-x525
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/08/GHSA-4cww-f7w5-x525/GHSA-4cww-f7w5-x525.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4cww-f7w5-x525
Aliases
Published
2021-08-25T20:46:13Z
Modified
2023-12-08T19:31:23Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Stack consumption in trust-dns-server
Details

There's a stack overflow leading to a crash and potential DOS when processing additional records for return of MX or SRV record types from the server. This is only possible when a zone is configured with a null target for MX or SRV records. Prior to 0.16.0 the additional record processing was not supported by trust-dns-server. There Are no known issues with upgrading from 0.16 or 0.17 to 0.18.1. The remidy should be to upgrade to 0.18.1. If unable to do so, MX, SRV or other record types with a target to the null type, should be avoided.

Database specific
{
    "nvd_published_at": "2020-12-31T10:15:14Z",
    "cwe_ids": [
        "CWE-400"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2021-08-19T21:20:03Z"
}
References

Affected packages

crates.io / trust-dns-server

Package

Name
trust-dns-server
View open source insights on deps.dev
Purl
pkg:cargo/trust-dns-server

Affected ranges

Type
SEMVER
Events
Introduced
0.16.0
Fixed
0.18.1