#VU24076 Stack-based buffer overflow in Trust-DNS-Server
Published: January 8, 2020
Trust-DNS-Server
Benjamin Fry
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing additional records for return of MX or SRV record types from the server. A remote unauthenticated attacker can trigger stack-based buffer overflow and cause a denial of service condition on the target system.
Note: This is only possible when a zone is configured with a null target for MX or SRV records, i.e. ".".
Example affected zone record:
no-service 86400 IN MX 0 .