Description
tls-listener is a rust lang wrapper around a connection listener to support TLS. With the default configuration of tls-listener, a malicious user can open 6.4 `TcpStream`s a second, sending 0 bytes, and can trigger a DoS. The default configuration options make any public service using `TlsListener::new()` vulnerable to a slow-loris DoS attack. This impacts any publicly accessible service using the default configuration of tls-listener in versions prior to 0.10.0. Users are advised to upgrade. Users unable to upgrade may mitigate this by passing a large value, such as `usize::MAX` as the parameter to `Builder::max_handshakes`.

Published: 2024-03-15
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-0790 tls-listener affected by the slow loris vulnerability with default configuration
Github GHSA Github GHSA GHSA-2qph-qpvm-2qf7 tls-listener affected by the slow loris vulnerability with default configuration
History

Wed, 09 Apr 2025 16:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:tmccombs:tls-listener:*:*:*:*:*:rust:*:*

Subscriptions

Tmccombs Tls-listener
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T00:56:58.073Z

Reserved: 2024-03-11T22:45:07.685Z

Link: CVE-2024-28854

cve-icon Vulnrichment

Updated: 2024-07-26T14:49:04.427Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-15T19:15:07.627

Modified: 2025-04-09T15:36:02.133

Link: CVE-2024-28854

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses