{"id":"CVE-2020-35857","details":"An issue was discovered in the trust-dns-server crate before 0.18.1 for Rust. DNS MX and SRV null targets are mishandled, causing stack consumption.","aliases":["GHSA-4cww-f7w5-x525","RUSTSEC-2020-0001"],"modified":"2026-03-14T10:29:13.886700Z","published":"2020-12-31T10:15:14.770Z","references":[{"type":"FIX","url":"https://github.com/bluejekyll/trust-dns/commit/8b9eab05795fdc098976262853b2498055c7a8f3"},{"type":"EVIDENCE","url":"https://rustsec.org/advisories/RUSTSEC-2020-0001.html"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0.16.0"},{"fixed":"0.18.1"}]},{"events":[{"introduced":"0"},{"fixed":"0.18.1"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-35857.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}