SB2020010804 - Denial of service in trust-dns-server for Rust
Published: January 8, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Stack-based buffer overflow (CVE-ID: N/A)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing additional records for return of MX or SRV record types from the server. A remote unauthenticated attacker can trigger stack-based buffer overflow and cause a denial of service condition on the target system.
Note: This is only possible when a zone is configured with a null target for MX or SRV records, i.e. ".".
Example affected zone record:
no-service 86400 IN MX 0 .
Remediation
Install update from vendor's website.