Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-28854
HistoryMar 15, 2024 - 6:54 p.m.

CVE-2024-28854 Slow loris vulnerability with default configuration in tls-listener

2024-03-1518:54:58
CWE-400
GitHub_M
www.cve.org
cve-2024-28854
slow loris vulnerability
tls-listener
rust lang
tls
dos attack
upgrade
max_handshakes
mitigation

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

15.5%

tls-listener is a rust lang wrapper around a connection listener to support TLS. With the default configuration of tls-listener, a malicious user can open 6.4 TcpStreams a second, sending 0 bytes, and can trigger a DoS. The default configuration options make any public service using TlsListener::new() vulnerable to a slow-loris DoS attack. This impacts any publicly accessible service using the default configuration of tls-listener in versions prior to 0.10.0. Users are advised to upgrade. Users unable to upgrade may mitigate this by passing a large value, such as usize::MAX as the parameter to Builder::max_handshakes.

CNA Affected

[
  {
    "vendor": "tmccombs",
    "product": "tls-listener",
    "versions": [
      {
        "version": "< 0.10.0",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

15.5%

Related for CVELIST:CVE-2024-28854