srs2.c in PostSRSd before 1.10 allows remote attackers to cause a denial of service (CPU consumption) via a long timestamp tag in an SRS address.
{ "vanir_signatures": [ { "target": { "file": "srs2.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "289337015076634359955344847264667610945", "258333214946563653037667618994653256138", "233886238361932281857854205422456740988" ] }, "signature_type": "Line", "signature_version": "v1", "deprecated": false, "id": "CVE-2020-35573-4c473993", "source": "https://github.com/roehling/postsrsd/commit/4733fb11f6bec6524bb8518c5e1a699288c26bac" }, { "target": { "file": "srs2.c", "function": "srs_timestamp_check" }, "digest": { "function_hash": "200941730823154787439090683899907719258", "length": 580.0 }, "signature_type": "Function", "signature_version": "v1", "deprecated": false, "id": "CVE-2020-35573-788b8b7a", "source": "https://github.com/roehling/postsrsd/commit/4733fb11f6bec6524bb8518c5e1a699288c26bac" } ] }