Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. trust-dns-server
  4. ›
  5. CVE-2020-35857

CVE-2020-35857: Stack consumption in trust-dns-server

August 25, 2021 (updated December 8, 2023)

There’s a stack overflow leading to a crash and potential DOS when processing additional records for return of MX or SRV record types from the server. This is only possible when a zone is configured with a null target for MX or SRV records. Prior to 0.16.0 the additional record processing was not supported by trust-dns-server. There Are no known issues with upgrading from 0.16 or 0.17 to 0.18.1. The remidy should be to upgrade to 0.18.1. If unable to do so, MX, SRV or other record types with a target to the null type, should be avoided.

References

  • github.com/advisories/GHSA-4cww-f7w5-x525
  • github.com/bluejekyll/trust-dns
  • github.com/bluejekyll/trust-dns/commit/8b9eab05795fdc098976262853b2498055c7a8f3
  • github.com/bluejekyll/trust-dns/issues/980
  • github.com/bluejekyll/trust-dns/pull/982
  • nvd.nist.gov/vuln/detail/CVE-2020-35857
  • rustsec.org/advisories/RUSTSEC-2020-0001.html

Code Behaviors & Features

Detect and mitigate CVE-2020-35857 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.16.0 before 0.18.1

Fixed versions

  • 0.18.1

Solution

Upgrade to version 0.18.1 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-400: Uncontrolled Resource Consumption

Source file

cargo/trust-dns-server/CVE-2020-35857.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:51 +0000.