CVE-2024-28854

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-28854
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-28854.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-28854
Aliases
Published
2024-03-15T19:15:07Z
Modified
2024-05-20T00:11:40.758300Z
Summary
[none]
Details

tls-listener is a rust lang wrapper around a connection listener to support TLS. With the default configuration of tls-listener, a malicious user can open 6.4 TcpStreams a second, sending 0 bytes, and can trigger a DoS. The default configuration options make any public service using TlsListener::new() vulnerable to a slow-loris DoS attack. This impacts any publicly accessible service using the default configuration of tls-listener in versions prior to 0.10.0. Users are advised to upgrade. Users unable to upgrade may mitigate this by passing a large value, such as usize::MAX as the parameter to Builder::max_handshakes.

References

Affected packages

Git / github.com/tmccombs/tls-listener

Affected ranges

Type
GIT
Repo
https://github.com/tmccombs/tls-listener
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1
v0.1.1
v0.2.0
v0.2.1
v0.3.0
v0.4.0
v0.4.1
v0.4.2
v0.5.0
v0.5.1
v0.6.0
v0.7.0
v0.8.0
v0.9.0
v0.9.1