Описание
tls-listener is a rust lang wrapper around a connection listener to support TLS. With the default configuration of tls-listener, a malicious user can open 6.4 TcpStreams a second, sending 0 bytes, and can trigger a DoS. The default configuration options make any public service using TlsListener::new() vulnerable to a slow-loris DoS attack. This impacts any publicly accessible service using the default configuration of tls-listener in versions prior to 0.10.0. Users are advised to upgrade. Users unable to upgrade may mitigate this by passing a large value, such as usize::MAX as the parameter to Builder::max_handshakes.
Ссылки
- Product
- Patch
- ExploitMitigationThird Party Advisory
- Product
- Patch
- ExploitMitigationThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.10.0 (исключая)
cpe:2.3:a:tmccombs:tls-listener:*:*:*:*:*:rust:*:*
EPSS
Процентиль: 34%
0.00136
Низкий
7.5 High
CVSS3
Дефекты
CWE-400
CWE-400
Связанные уязвимости
CVSS3: 7.5
github
почти 2 года назад
tls-listener affected by the slow loris vulnerability with default configuration
EPSS
Процентиль: 34%
0.00136
Низкий
7.5 High
CVSS3
Дефекты
CWE-400
CWE-400