Vulnerability Details CVE-2024-28854
tls-listener is a rust lang wrapper around a connection listener to support TLS. With the default configuration of tls-listener, a malicious user can open 6.4 `TcpStream`s a second, sending 0 bytes, and can trigger a DoS. The default configuration options make any public service using `TlsListener::new()` vulnerable to a slow-loris DoS attack. This impacts any publicly accessible service using the default configuration of tls-listener in versions prior to 0.10.0. Users are advised to upgrade. Users unable to upgrade may mitigate this by passing a large value, such as `usize::MAX` as the parameter to `Builder::max_handshakes`.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 34.1%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2024-28854
-
cpe:2.3:a:tmccombs:tls-listener:0.1
-
cpe:2.3:a:tmccombs:tls-listener:0.1.1
-
cpe:2.3:a:tmccombs:tls-listener:0.2.0
-
cpe:2.3:a:tmccombs:tls-listener:0.2.1
-
cpe:2.3:a:tmccombs:tls-listener:0.3.0
-
cpe:2.3:a:tmccombs:tls-listener:0.4.0
-
cpe:2.3:a:tmccombs:tls-listener:0.4.1
-
cpe:2.3:a:tmccombs:tls-listener:0.4.2
-
cpe:2.3:a:tmccombs:tls-listener:0.4.3
-
cpe:2.3:a:tmccombs:tls-listener:0.5.0
-
cpe:2.3:a:tmccombs:tls-listener:0.5.1
-
cpe:2.3:a:tmccombs:tls-listener:0.6.0
-
cpe:2.3:a:tmccombs:tls-listener:0.7.0
-
cpe:2.3:a:tmccombs:tls-listener:0.8.0
-
cpe:2.3:a:tmccombs:tls-listener:0.9.0
-
cpe:2.3:a:tmccombs:tls-listener:0.9.1