Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20110708152345.7e6115bc@redhat.com>
Date: Fri, 8 Jul 2011 15:23:45 +0200
From: Tomas Hoger <thoger@...hat.com>
To: OSS Security <oss-security@...ts.openwall.com>
Subject: SSL renegotiation DoS CVE-2011-1473

Hi!

FYI, as this has a nessus test, and likely to be seen and reported by
users.

CVE-2011-1473 is used seemingly for the SSL protocol issue.  Most
TLS/SSL implementations handle session renegotiation by default, client
may trigger high CPU use by renegotiating repeatedly and taking
advantage of the fact that there's more work to do on the server side
than on the client side.  Similar problem affects initial handshake
too, renegotiation allows achieving the same over single / few
connections.

This should affect most server apps using openssl and nss, but not
recent httpd/mod_ssl.

Original blog post is not accessible, but TLS WG list post has all the
relevant info.

http://orchilles.com/2011/03/ssl-renegotiation-dos.html
http://www.ietf.org/mail-archive/web/tls/current/msg07553.html
http://www.nessus.org/plugins/index.php?view=single&id=53491

-- 
Tomas Hoger / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.