gsd-2011-1473
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
** DISPUTED ** OpenSSL before 0.9.8l, and 0.9.8m through 1.x, does not properly restrict client-initiated renegotiation within the SSL and TLS protocols, which might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection, a different vulnerability than CVE-2011-5094. NOTE: it can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2011-1473", "description": "** DISPUTED ** OpenSSL before 0.9.8l, and 0.9.8m through 1.x, does not properly restrict client-initiated renegotiation within the SSL and TLS protocols, which might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection, a different vulnerability than CVE-2011-5094. NOTE: it can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment.", "id": "GSD-2011-1473", "references": [ "https://www.suse.com/security/cve/CVE-2011-1473.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2011-1473" ], "details": "** DISPUTED ** OpenSSL before 0.9.8l, and 0.9.8m through 1.x, does not properly restrict client-initiated renegotiation within the SSL and TLS protocols, which might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection, a different vulnerability than CVE-2011-5094. NOTE: it can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment.", "id": "GSD-2011-1473", "modified": "2023-12-13T01:19:07.855061Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1473", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** DISPUTED ** OpenSSL before 0.9.8l, and 0.9.8m through 1.x, does not properly restrict client-initiated renegotiation within the SSL and TLS protocols, which might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection, a different vulnerability than CVE-2011-5094. NOTE: it can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://vincent.bernat.im/en/blog/2011-ssl-dos-mitigation.html", "refsource": "MISC", "url": "http://vincent.bernat.im/en/blog/2011-ssl-dos-mitigation.html" }, { "name": "[tls] 20110315 Re: SSL Renegotiation DOS", "refsource": "MLIST", "url": "http://www.ietf.org/mail-archive/web/tls/current/msg07567.html" }, { "name": "[tls] 20110318 Re: SSL Renegotiation DOS", "refsource": "MLIST", "url": "http://www.ietf.org/mail-archive/web/tls/current/msg07577.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=707065", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=707065" }, { "name": "20140214 ESA-2014-009: RSA BSAFE SSL-J Multiple Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2014-02/0061.html" }, { "name": "http://www.educatedguesswork.org/2011/10/ssltls_and_computational_dos.html", "refsource": "MISC", "url": "http://www.educatedguesswork.org/2011/10/ssltls_and_computational_dos.html" }, { "name": "[oss-security] 20110708 SSL renegotiation DoS CVE-2011-1473", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2011/07/08/2" }, { "name": "SSRT100852", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2" }, { "name": "[tls] 20110318 Re: SSL Renegotiation DOS", "refsource": "MLIST", "url": "http://www.ietf.org/mail-archive/web/tls/current/msg07576.html" }, { "name": "http://orchilles.com/2011/03/ssl-renegotiation-dos.html", "refsource": "MISC", "url": "http://orchilles.com/2011/03/ssl-renegotiation-dos.html" }, { "name": "HPSBMU02776", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2" }, { "name": "[tls] 20110315 SSL Renegotiation DOS", "refsource": "MLIST", "url": "http://www.ietf.org/mail-archive/web/tls/current/msg07553.html" }, { "name": "[tls] 20110315 Re: SSL Renegotiation DOS", "refsource": "MLIST", "url": "http://www.ietf.org/mail-archive/web/tls/current/msg07564.html" }, { "name": "[rocketmq-dev] 20190527 [GitHub] [rocketmq] bix29 opened a new issue #1233: TLS Client-initiated renegotiation attack (CVE-2011-1473)", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/142b93d261e8ac7c5ceffdce848d622404abc1c286bbc999f43a9e10@%3Cdev.rocketmq.apache.org%3E" }, { "name": "[rocketmq-dev] 20190801 [GitHub] [rocketmq] duhenglucky commented on issue #1233: TLS Client-initiated renegotiation attack (CVE-2011-1473)", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/6121becfdd23f9aeb675d5db80616536277d5931d6cde9dca292e509@%3Cdev.rocketmq.apache.org%3E" }, { "name": "[rocketmq-dev] 20191024 [GitHub] [rocketmq] Journey-x commented on issue #1233: TLS Client-initiated renegotiation attack (CVE-2011-1473)", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/8be38d35654441140db8eb3f7433524b3653ac3fdc26e2fa94626a3a@%3Cdev.rocketmq.apache.org%3E" }, { "name": "[rocketmq-dev] 20200305 [GitHub] [rocketmq] ShadowySpirits commented on issue #1233: TLS Client-initiated renegotiation attack (CVE-2011-1473)", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r1e33410bb5c81536e7fe14b51fa83e7bfd9445db61fd10c134792bde@%3Cdev.rocketmq.apache.org%3E" }, { "name": "[rocketmq-dev] 20200305 [GitHub] [rocketmq] coveralls commented on issue #1820: [ISSUE #1233] Fix CVE-2011-1473", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r298a09a2b98446b27217d719e877c643b6d13fac0bcafe04696a446b@%3Cdev.rocketmq.apache.org%3E" }, { "name": "[rocketmq-dev] 20200305 [GitHub] [rocketmq] ShadowySpirits opened a new pull request #1820: [ISSUE #1233] Fix CVE-2011-1473", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r77fe575893261889b983e067293be72fa1f8c6305ede9fdbc404c514@%3Cdev.rocketmq.apache.org%3E" }, { "name": "[rocketmq-dev] 20210311 [GitHub] [rocketmq] vongosling closed issue #1233: TLS Client-initiated renegotiation attack (CVE-2011-1473)", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r5e595b91f00613dafa635852121d45b161e8b5c3eba4551aeccc6483@%3Cdev.rocketmq.apache.org%3E" }, { "name": "[rocketmq-commits] 20210311 [rocketmq] branch develop updated: [ISSUE #1233] Fix CVE-2011-1473", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r3822ad69442291562c2ab41132fc49780d269e8b52deb458b7060f6d@%3Ccommits.rocketmq.apache.org%3E" }, { "name": "[rocketmq-dev] 20210311 [GitHub] [rocketmq] vongosling merged pull request #1820: [ISSUE #1233] Fix CVE-2011-1473", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r8680f41bcdad13c3f267cb868b45e5fb1f57df8b39d25193f7d66500@%3Cdev.rocketmq.apache.org%3E" }, { "name": "[rocketmq-dev] 20210311 [GitHub] [rocketmq] mouzz commented on pull request #1820: [ISSUE #1233] Fix CVE-2011-1473", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ra95c355827b3c96c8013ed8e0666c851581651be2524f3d28cd4fe71@%3Cdev.rocketmq.apache.org%3E" }, { "name": "[rocketmq-dev] 20210327 [GitHub] [rocketmq] liufeiguo commented on pull request #1820: [ISSUE #1233] Fix CVE-2011-1473", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r13a07a09f98b2841193dbf17a47c7f09b464e0747a1d3e7298ad4c81@%3Cdev.rocketmq.apache.org%3E" }, { "name": "[rocketmq-dev] 20210420 [GitHub] [rocketmq] mouzz commented on pull request #1820: [ISSUE #1233] Fix CVE-2011-1473", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf9e8ae0356af3ec4f7780ca651b770721d287d4d55f62f4f754e0a6f@%3Cdev.rocketmq.apache.org%3E" }, { "name": "[rocketmq-dev] 20210420 [GitHub] [rocketmq] mouzz removed a comment on pull request #1820: [ISSUE #1233] Fix CVE-2011-1473", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rc98eaa3f8223ac75aa5969f717954d8cbc9f3a9d8b7a6156a54fa557@%3Cdev.rocketmq.apache.org%3E" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*", "matchCriteriaId": "3C9BF2DD-85EF-49CF-8D83-0DB46449E333", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*", "matchCriteriaId": "6AEBE689-3952-46F0-BACA-BB03041C6D36", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*", "matchCriteriaId": "86C46AB8-52E5-4385-9C5C-F63FF9DB82AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*", "matchCriteriaId": "564AA4E7-223E-48D8-B3E0-A461969CF530", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*", "matchCriteriaId": "A82CFB41-BEA5-4B5F-BCAA-9BAED22EEAF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*", "matchCriteriaId": "EB15C1F3-0DE8-4A50-B17C-618ECA58AABF", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*", "matchCriteriaId": "45491BD3-7C62-4422-B7DA-CB2741890FBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*", "matchCriteriaId": "499E52F3-4B34-4C47-8ABF-292928EBAA5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*", "matchCriteriaId": "D530BE19-ADCF-4B5C-99E0-2B9A1DE7717F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*", "matchCriteriaId": "A7540155-3629-4C76-9C67-8A8E0C1067F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*", "matchCriteriaId": "419BBCCD-6F8A-418A-BA02-56267B11D948", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*", "matchCriteriaId": "8A3A2AF8-C7DD-43D0-B03F-37E7EB735C1D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB35F63F-7856-42EE-87A6-7EC7F10C2032", "versionEndIncluding": "0.9.8k", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenSSL before 0.9.8l, and 0.9.8m through 1.x, does not properly restrict client-initiated renegotiation within the SSL and TLS protocols, which might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection, a different vulnerability than CVE-2011-5094. NOTE: it can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment" }, { "lang": "es", "value": "** EN DISPUTA ** OpenSSL anterior a v0.9.8l y v0.9.8m a trav\u00e9s de 1.x, no restringen adecuadamente por el cliente dentro de la renegociaci\u00f3n de los protocolos SSL y TLS, lo que podr\u00eda hacer m\u00e1s f\u00e1cil para los atacantes remotos causar una denegaci\u00f3n de servicio (el consumo de CPU) mediante la realizaci\u00f3n de las renegociaciones de muchos dentro de una sola conexi\u00f3n, una vulnerabilidad diferente a CVE-2011-5094. NOTA: tambi\u00e9n se puede argumentar que es la responsabilidad de las implementaciones de servidores, no una biblioteca de seguridad, para prevenir o limitar la renegociaci\u00f3n cuando es inapropiado dentro de un entorno espec\u00edfico." } ], "id": "CVE-2011-1473", "lastModified": "2024-04-11T00:47:49.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-06-16T21:55:02.437", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2014-02/0061.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://orchilles.com/2011/03/ssl-renegotiation-dos.html" }, { "source": "cve@mitre.org", "url": "http://vincent.bernat.im/en/blog/2011-ssl-dos-mitigation.html" }, { "source": "cve@mitre.org", "url": "http://www.educatedguesswork.org/2011/10/ssltls_and_computational_dos.html" }, { "source": "cve@mitre.org", "url": "http://www.ietf.org/mail-archive/web/tls/current/msg07553.html" }, { "source": "cve@mitre.org", "url": "http://www.ietf.org/mail-archive/web/tls/current/msg07564.html" }, { "source": "cve@mitre.org", "url": "http://www.ietf.org/mail-archive/web/tls/current/msg07567.html" }, { "source": "cve@mitre.org", "url": "http://www.ietf.org/mail-archive/web/tls/current/msg07576.html" }, { "source": "cve@mitre.org", "url": "http://www.ietf.org/mail-archive/web/tls/current/msg07577.html" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2011/07/08/2" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=707065" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/142b93d261e8ac7c5ceffdce848d622404abc1c286bbc999f43a9e10%40%3Cdev.rocketmq.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/6121becfdd23f9aeb675d5db80616536277d5931d6cde9dca292e509%40%3Cdev.rocketmq.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/8be38d35654441140db8eb3f7433524b3653ac3fdc26e2fa94626a3a%40%3Cdev.rocketmq.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r13a07a09f98b2841193dbf17a47c7f09b464e0747a1d3e7298ad4c81%40%3Cdev.rocketmq.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r1e33410bb5c81536e7fe14b51fa83e7bfd9445db61fd10c134792bde%40%3Cdev.rocketmq.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r298a09a2b98446b27217d719e877c643b6d13fac0bcafe04696a446b%40%3Cdev.rocketmq.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r3822ad69442291562c2ab41132fc49780d269e8b52deb458b7060f6d%40%3Ccommits.rocketmq.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r5e595b91f00613dafa635852121d45b161e8b5c3eba4551aeccc6483%40%3Cdev.rocketmq.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r77fe575893261889b983e067293be72fa1f8c6305ede9fdbc404c514%40%3Cdev.rocketmq.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r8680f41bcdad13c3f267cb868b45e5fb1f57df8b39d25193f7d66500%40%3Cdev.rocketmq.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/ra95c355827b3c96c8013ed8e0666c851581651be2524f3d28cd4fe71%40%3Cdev.rocketmq.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rc98eaa3f8223ac75aa5969f717954d8cbc9f3a9d8b7a6156a54fa557%40%3Cdev.rocketmq.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rf9e8ae0356af3ec4f7780ca651b770721d287d4d55f62f4f754e0a6f%40%3Cdev.rocketmq.apache.org%3E" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.