5
CVSSv2

CVE-2011-1473

Published: 16/06/2012 Updated: 11/04/2024
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 449
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

OpenSSL prior to 0.9.8l, and 0.9.8m up to and including 1.x, does not properly restrict client-initiated renegotiation within the SSL and TLS protocols, which might make it easier for remote malicious users to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection, a different vulnerability than CVE-2011-5094. NOTE: it can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 0.9.8m

openssl openssl 0.9.8n

openssl openssl 0.9.8p

openssl openssl 0.9.8u

openssl openssl 0.9.8s

openssl openssl 0.9.8r

openssl openssl 0.9.8t

openssl openssl 0.9.8o

openssl openssl 0.9.8w

openssl openssl 0.9.8v

openssl openssl 0.9.8x

openssl openssl

Vendor Advisories

Tenable's Nessus scanner is affected by a vulnerability in the bundled version of the OpenSSL library The issue is triggered when a malicious client requests multiple SSL/TLS renegotations, and will result in a temporary loss of availability for the web service ...

Github Repositories

not by me

pentmenu A bash script inspired by pentbox Designed to be a simple way to implement various network pentesting functions, including network attacks, using wherever possible readily available software commonly installed on most linux distributions without having to resort to multiple specialist tools technicalhelperchetancom Sudo is implemented where necesssary Tested

pentmenu A bash script inspired by pentbox Designed to be a simple way to implement various network pentesting functions, including network attacks, using wherever possible readily available software commonly installed on most linux distributions without having to resort to multiple specialist tools thcborg Sudo is implemented where necesssary Tested on Debian and Ar

pentmenu 中文说明 A bash select menu for quick and easy network recon and DOS attacks Sudo is implemented where necessary Tested on Debian and Arch Contributions and pull requests are most welcome! Requirements: bash sudo curl netcat (must support '-k' option, openbsd variant recommended) hping3 (or nping can be used as a substitute for flood attacks)

DDOS Requirements: bash sudo curl netcat (must support '-k' option, openbsd variant recommended) hping3 (or nping can be used as a substitute for flood attacks) openssl stunnel nmap whois (not essential but preferred) nslookup (or 'host') RECON MODULES Show IP - uses curl to perform a lookup of your external IP Runs ip a or ifconfig

pentmenu 中文说明 A bash select menu for quick and easy network recon and DOS attacks Sudo is implemented where necessary Tested on Debian and Arch Contributions and pull requests are most welcome! Requirements: bash sudo curl netcat (must support '-k' option, openbsd variant recommended) hping3 (or nping can be used as a substitute for flood attacks)

Tool Dos/Ddos

Pentmenu Một bash menu lựa chọn để khôi phục mạng nhanh chóng và dễ dàng và các cuộc tấn công DOS Sudo được thực hiện khi cần thiết Đã thử nghiệm trên Debian và Arch Yêu cầu: bash sudo curl netcat (phải hỗ trợ '-k' tùy chọn, biến thể ope

A bash script for recon and DOS attacks

pentmenu 中文说明 A bash select menu for quick and easy network recon and DOS attacks Sudo is implemented where necessary Tested on Debian and Arch Contributions and pull requests are most welcome! Requirements: bash sudo curl netcat (must support '-k' option, openbsd variant recommended) hping3 (or nping can be used as a substitute for flood attacks)

script simple [DDOS] Distributed danial of service

DDOS Version 124 A bash script inspired by pentbox Designed to be a simple way to implement various network pentesting functions, including network attacks, using wherever possible readily available software commonly installed on most linux distributions without having to resort to multiple specialist tools Sudo is implemented where necesssary Tested on Debian and Arch

pentmenu 中文说明 A bash select menu for quick and easy network recon and DOS attacks Sudo is implemented where necessary Tested on Debian and Arch Contributions and pull requests are most welcome! Requirements: bash sudo curl netcat (must support '-k' option, openbsd variant recommended) hping3 (or nping can be used as a substitute for flood attacks)

pentmenu A bash select menu for quick and easy network recon and DOS attacks Sudo is implemented where necesssary Tested on Debian and Arch Requirements: bash sudo curl netcat (must support '-k' option, openbsd variant recommended) hping3 (or nping can be used as a substitute for flood attacks) openssl stunnel nmap whois (not essential but preferre

pentmenu A bash script inspired by pentbox Designed to be a simple way to implement various network pentesting functions, including network attacks, using wherever possible readily available software commonly installed on most linux distributions without having to resort to multiple specialist tools thcborg Sudo is implemented where necesssary Tested on Debian and Ar

ddos源码

A bash script inspired by pentbox Designed to be a simple way to implement various network pentesting functions, including network attacks, using wherever possible readily available software commonly installed on most linux distributions without having to resort to multiple specialist tools Sudo is implemented where necesssary Tested on Debian and Arch Requirements: bash

pentmenu A bash script inspired by pentbox Designed to be a simple way to implement various network pentesting functions, including network attacks, using wherever possible readily available software commonly installed on most linux distributions without having to resort to multiple specialist tools Sudo is implemented where necesssary Tested on Debian and Arch Requirements

pentmenu A bash select menu for quick and easy network recon and DOS attacks Sudo is implemented where necesssary Tested on Debian and Arch Requirements: bash sudo curl netcat (must support '-k' option, openbsd variant recommended) hping3 (or nping can be used as a substitute for flood attacks) openssl stunnel nmap whois (not essential but preferre

References

CWE-264http://www.openwall.com/lists/oss-security/2011/07/08/2http://orchilles.com/2011/03/ssl-renegotiation-dos.htmlhttp://www.ietf.org/mail-archive/web/tls/current/msg07553.htmlhttp://www.ietf.org/mail-archive/web/tls/current/msg07576.htmlhttps://bugzilla.redhat.com/show_bug.cgi?id=707065http://www.ietf.org/mail-archive/web/tls/current/msg07564.htmlhttp://www.educatedguesswork.org/2011/10/ssltls_and_computational_dos.htmlhttp://www.ietf.org/mail-archive/web/tls/current/msg07567.htmlhttp://vincent.bernat.im/en/blog/2011-ssl-dos-mitigation.htmlhttp://www.ietf.org/mail-archive/web/tls/current/msg07577.htmlhttp://archives.neohapsis.com/archives/bugtraq/2014-02/0061.htmlhttp://marc.info/?l=bugtraq&m=133951357207000&w=2https://lists.apache.org/thread.html/142b93d261e8ac7c5ceffdce848d622404abc1c286bbc999f43a9e10%40%3Cdev.rocketmq.apache.org%3Ehttps://lists.apache.org/thread.html/6121becfdd23f9aeb675d5db80616536277d5931d6cde9dca292e509%40%3Cdev.rocketmq.apache.org%3Ehttps://lists.apache.org/thread.html/8be38d35654441140db8eb3f7433524b3653ac3fdc26e2fa94626a3a%40%3Cdev.rocketmq.apache.org%3Ehttps://lists.apache.org/thread.html/r1e33410bb5c81536e7fe14b51fa83e7bfd9445db61fd10c134792bde%40%3Cdev.rocketmq.apache.org%3Ehttps://lists.apache.org/thread.html/r298a09a2b98446b27217d719e877c643b6d13fac0bcafe04696a446b%40%3Cdev.rocketmq.apache.org%3Ehttps://lists.apache.org/thread.html/r77fe575893261889b983e067293be72fa1f8c6305ede9fdbc404c514%40%3Cdev.rocketmq.apache.org%3Ehttps://lists.apache.org/thread.html/r5e595b91f00613dafa635852121d45b161e8b5c3eba4551aeccc6483%40%3Cdev.rocketmq.apache.org%3Ehttps://lists.apache.org/thread.html/r3822ad69442291562c2ab41132fc49780d269e8b52deb458b7060f6d%40%3Ccommits.rocketmq.apache.org%3Ehttps://lists.apache.org/thread.html/r8680f41bcdad13c3f267cb868b45e5fb1f57df8b39d25193f7d66500%40%3Cdev.rocketmq.apache.org%3Ehttps://lists.apache.org/thread.html/ra95c355827b3c96c8013ed8e0666c851581651be2524f3d28cd4fe71%40%3Cdev.rocketmq.apache.org%3Ehttps://lists.apache.org/thread.html/r13a07a09f98b2841193dbf17a47c7f09b464e0747a1d3e7298ad4c81%40%3Cdev.rocketmq.apache.org%3Ehttps://lists.apache.org/thread.html/rf9e8ae0356af3ec4f7780ca651b770721d287d4d55f62f4f754e0a6f%40%3Cdev.rocketmq.apache.org%3Ehttps://lists.apache.org/thread.html/rc98eaa3f8223ac75aa5969f717954d8cbc9f3a9d8b7a6156a54fa557%40%3Cdev.rocketmq.apache.org%3Ehttps://nvd.nist.govhttps://github.com/Mitko1223tm/pentmenuhttps://www.tenable.com/security/tns-2011-01