An issue was discovered in the trust-dns-server crate before 0.18.1 for Rust. DNS MX and SRV null targets are mishandled, causing stack consumption.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://rustsec.org/advisories/RUSTSEC-2020-0001.html | third party advisory exploit |
https://github.com/bluejekyll/trust-dns/commit/8b9eab05795fdc098976262853b2498055c7a8f3 |