mirror of
https://github.com/OMGeeky/advisory-db.git
synced 2025-12-29 15:56:07 +01:00
trust-dns-server additions processing overflows stack
This commit is contained in:
25
crates/trust-dns-server/RUSTSEC-0000-0000.toml
Normal file
25
crates/trust-dns-server/RUSTSEC-0000-0000.toml
Normal file
@@ -0,0 +1,25 @@
|
||||
[advisory]
|
||||
id = "RUSTSEC-0000-0000"
|
||||
package = "trust-dns-server"
|
||||
date = "2020-01-06"
|
||||
title = "Stack overflow when resolving addional records from MX or SRV null targets"
|
||||
description = """
|
||||
There's a stack overflow leading to a crash and potential DOS when processing
|
||||
additional records for return of MX or SRV record types from the server.
|
||||
|
||||
This is only possible when a zone is configured with a null target for MX or SRV records, i.e. '.'.
|
||||
|
||||
Example effected zone record:
|
||||
```text
|
||||
no-service 86400 IN MX 0 .
|
||||
```
|
||||
|
||||
Prior to 0.16.0 the additional record processing was not supported by trust-dns-server. There
|
||||
Are no known issues with upgrading from 0.16 or 0.17 to 0.18.1. The remidy should be to upgrade to
|
||||
0.18.1. If unable to do so, MX, SRV or other record types with a target to the null type, should be avoided.
|
||||
"""
|
||||
patched_versions = [">= 0.18.1"]
|
||||
unaffected_versions = ["< 0.16.0"]
|
||||
url = "https://github.com/bluejekyll/trust-dns/issues/980"
|
||||
categories = ["denial-of-service"]
|
||||
keywords = [ "stack-overflow", "crash" ]
|
||||
Reference in New Issue
Block a user