Stack-based buffer overflow in Trust-DNS-Server - #VU24076
Published: January 8, 2020
Trust-DNS-Server
Detailed vulnerability description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing additional records for return of MX or SRV record types from the server. A remote unauthenticated attacker can trigger stack-based buffer overflow and cause a denial of service condition on the target system.
Note: This is only possible when a zone is configured with a null target for MX or SRV records, i.e. ".".
Example affected zone record:
no-service 86400 IN MX 0 .