OpenSSL before 0.9.8l, and 0.9.8m through 1.x, does not properly restrict client-initiated renegotiation within the SSL and TLS protocols, which might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection, a different vulnerability than CVE-2011-5094. NOTE: it can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment
References
Link Providers
http://archives.neohapsis.com/archives/bugtraq/2014-02/0061.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=133951357207000&w=2 cve-icon cve-icon
http://orchilles.com/2011/03/ssl-renegotiation-dos.html cve-icon cve-icon
http://vincent.bernat.im/en/blog/2011-ssl-dos-mitigation.html cve-icon cve-icon
http://www.educatedguesswork.org/2011/10/ssltls_and_computational_dos.html cve-icon cve-icon
http://www.ietf.org/mail-archive/web/tls/current/msg07553.html cve-icon cve-icon
http://www.ietf.org/mail-archive/web/tls/current/msg07564.html cve-icon cve-icon
http://www.ietf.org/mail-archive/web/tls/current/msg07567.html cve-icon cve-icon
http://www.ietf.org/mail-archive/web/tls/current/msg07576.html cve-icon cve-icon
http://www.ietf.org/mail-archive/web/tls/current/msg07577.html cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2011/07/08/2 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=707065 cve-icon cve-icon
https://lists.apache.org/thread.html/142b93d261e8ac7c5ceffdce848d622404abc1c286bbc999f43a9e10%40%3Cdev.rocketmq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/6121becfdd23f9aeb675d5db80616536277d5931d6cde9dca292e509%40%3Cdev.rocketmq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/8be38d35654441140db8eb3f7433524b3653ac3fdc26e2fa94626a3a%40%3Cdev.rocketmq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r13a07a09f98b2841193dbf17a47c7f09b464e0747a1d3e7298ad4c81%40%3Cdev.rocketmq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r1e33410bb5c81536e7fe14b51fa83e7bfd9445db61fd10c134792bde%40%3Cdev.rocketmq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r298a09a2b98446b27217d719e877c643b6d13fac0bcafe04696a446b%40%3Cdev.rocketmq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r3822ad69442291562c2ab41132fc49780d269e8b52deb458b7060f6d%40%3Ccommits.rocketmq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r5e595b91f00613dafa635852121d45b161e8b5c3eba4551aeccc6483%40%3Cdev.rocketmq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r77fe575893261889b983e067293be72fa1f8c6305ede9fdbc404c514%40%3Cdev.rocketmq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r8680f41bcdad13c3f267cb868b45e5fb1f57df8b39d25193f7d66500%40%3Cdev.rocketmq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/ra95c355827b3c96c8013ed8e0666c851581651be2524f3d28cd4fe71%40%3Cdev.rocketmq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rc98eaa3f8223ac75aa5969f717954d8cbc9f3a9d8b7a6156a54fa557%40%3Cdev.rocketmq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf9e8ae0356af3ec4f7780ca651b770721d287d4d55f62f4f754e0a6f%40%3Cdev.rocketmq.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2011-1473 cve-icon
https://www.cve.org/CVERecord?id=CVE-2011-1473 cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2012-06-16T21:00:00

Updated: 2024-08-06T22:28:41.480Z

Reserved: 2011-03-21T00:00:00

Link: CVE-2011-1473

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2012-06-16T21:55:02.437

Modified: 2024-11-21T01:26:23.790

Link: CVE-2011-1473

cve-icon Redhat

Severity : Low

Publid Date: 2011-03-13T00:00:00Z

Links: CVE-2011-1473 - Bugzilla