tls-listener is a rust lang wrapper around a connection listener to support TLS. With the default configuration of tls-listener, a malicious user can open 6.4 `TcpStream`s a second, sending 0 bytes, and can trigger a DoS. The default configuration options make any public service using `TlsListener::new()` vulnerable to a slow-loris DoS attack. This impacts any publicly accessible service using the default configuration of tls-listener in versions prior to 0.10.0. Users are advised to upgrade. Users unable to upgrade may mitigate this by passing a large value, such as `usize::MAX` as the parameter to `Builder::max_handshakes`.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-03-15T18:54:58.524Z

Updated: 2024-08-02T00:56:58.073Z

Reserved: 2024-03-11T22:45:07.685Z

Link: CVE-2024-28854

cve-icon Vulnrichment

Updated: 2024-07-26T14:49:04.427Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-15T19:15:07.627

Modified: 2024-11-21T09:07:03.207

Link: CVE-2024-28854

cve-icon Redhat

No data.