CVE-2024-28854

tls-listener is a rust lang wrapper around a connection listener to support TLS. With the default configuration of tls-listener, a malicious user can open 6.4 `TcpStream`s a second, sending 0 bytes, and can trigger a DoS. The default configuration options make any public service using `TlsListener::new()` vulnerable to a slow-loris DoS attack. This impacts any publicly accessible service using the default configuration of tls-listener in versions prior to 0.10.0. Users are advised to upgrade. Users unable to upgrade may mitigate this by passing a large value, such as `usize::MAX` as the parameter to `Builder::max_handshakes`.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tmccombs:tls-listener:*:*:*:*:*:rust:*:*

History

09 Apr 2025, 15:36

Type Values Removed Values Added
First Time Tmccombs
Tmccombs tls-listener
CPE cpe:2.3:a:tmccombs:tls-listener:*:*:*:*:*:rust:*:*
References () https://en.wikipedia.org/wiki/Slowloris_(computer_security) - () https://en.wikipedia.org/wiki/Slowloris_(computer_security) - Product
References () https://github.com/tmccombs/tls-listener/commit/d5a7655d6ea9e53ab57c3013092c5576da964bc4 - () https://github.com/tmccombs/tls-listener/commit/d5a7655d6ea9e53ab57c3013092c5576da964bc4 - Patch
References () https://github.com/tmccombs/tls-listener/security/advisories/GHSA-2qph-qpvm-2qf7 - () https://github.com/tmccombs/tls-listener/security/advisories/GHSA-2qph-qpvm-2qf7 - Exploit, Third Party Advisory, Mitigation

Information

Published : 2024-03-15 19:15

Updated : 2025-04-09 15:36


NVD link : CVE-2024-28854

Mitre link : CVE-2024-28854

CVE.ORG link : CVE-2024-28854


JSON object : View

Products Affected

tmccombs

  • tls-listener
CWE
CWE-400

Uncontrolled Resource Consumption