CVE-2024-28854
CVSS V2 None
CVSS V3 None
Description
tls-listener is a rust lang wrapper around a connection listener to support TLS. With the default configuration of tls-listener, a malicious user can open 6.4 `TcpStream`s a second, sending 0 bytes, and can trigger a DoS. The default configuration options make any public service using `TlsListener::new()` vulnerable to a slow-loris DoS attack. This impacts any publicly accessible service using the default configuration of tls-listener in versions prior to 0.10.0. Users are advised to upgrade. Users unable to upgrade may mitigate this by passing a large value, such as `usize::MAX` as the parameter to `Builder::max_handshakes`.
Overview
- CVE ID
- CVE-2024-28854
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-03-15T18:54:58.524Z
- Last Modified Date
- 2024-03-15T18:54:58.524Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/tmccombs/tls-listener/security/advisories/GHSA-2qph-qpvm-2qf7 | x_refsource_CONFIRM |
https://github.com/tmccombs/tls-listener/commit/d5a7655d6ea9e53ab57c3013092c5576da964bc4 | x_refsource_MISC |
https://en.wikipedia.org/wiki/Slowloris_(computer_security) | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-28854 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28854 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 07:34:24 | Added to TrackCVE |