tls-listener is a rust lang wrapper around a connection listener to support TLS. With the default configuration of tls-listener, a malicious user can open 6.4 `TcpStream`s a second, sending 0 bytes, and can trigger a DoS. The default configuration options make any public service using `TlsListener::new()` vulnerable to a slow-loris DoS attack. This impacts any publicly accessible service using the default configuration of tls-listener in versions prior to 0.10.0. Users are advised to upgrade. Users unable to upgrade may mitigate this by passing a large value, such as `usize::MAX` as the parameter to `Builder::max_handshakes`.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0790 | tls-listener affected by the slow loris vulnerability with default configuration |
Github GHSA |
GHSA-2qph-qpvm-2qf7 | tls-listener affected by the slow loris vulnerability with default configuration |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 09 Apr 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:tmccombs:tls-listener:*:*:*:*:*:rust:*:* |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T00:56:58.073Z
Reserved: 2024-03-11T22:45:07.685Z
Link: CVE-2024-28854
Updated: 2024-07-26T14:49:04.427Z
Status : Analyzed
Published: 2024-03-15T19:15:07.627
Modified: 2025-04-09T15:36:02.133
Link: CVE-2024-28854
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA