Executive Summary

Informations
Name CVE-2011-1473 First vendor Publication 2012-06-16
Vendor Cve Last vendor Modification 2019-05-27

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

** DISPUTED ** OpenSSL before 0.9.8l, and 0.9.8m through 1.x, does not properly restrict client-initiated renegotiation within the SSL and TLS protocols, which might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection, a different vulnerability than CVE-2011-5094. NOTE: it can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1473

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:25037
 
Oval ID: oval:org.mitre.oval:def:25037
Title: Vulnerability in OpenSSL before 0.9.8l, and 0.9.8m through 1.x, does not properly restrict client-initiated renegotiation within the SSL and TLS protocols
Description: ** DISPUTED ** OpenSSL before 0.9.8l, and 0.9.8m through 1.x, does not properly restrict client-initiated renegotiation within the SSL and TLS protocols, which might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection, a different vulnerability than CVE-2011-5094. NOTE: it can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment.
Family: windows Class: vulnerability
Reference(s): CVE-2011-1473
Version: 4
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): OpenSSL
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 255

Open Source Vulnerability Database (OSVDB)

Id Description
73894 Multiple Vendor SSL/TLS Implementation Renegotiation DoS

Multiple products contain a flaw that may allow a remote denial of service. The issue is triggered when a malicious client requests multiple SSL/TLS renegotations, and will result in loss of availability for the service.

Snort® IPS/IDS

Date Description
2014-01-10 THC SSL renegotiation DOS attempt
RuleID : 20439 - Revision : 6 - Type : MALWARE-TOOLS
2014-01-10 THC SSL renegotiation DOS attempt
RuleID : 20438 - Revision : 6 - Type : MALWARE-TOOLS
2014-01-10 THC SSL renegotiation DOS attempt
RuleID : 20437 - Revision : 6 - Type : MALWARE-TOOLS
2014-01-10 THC SSL renegotiation DOS attempt
RuleID : 20436 - Revision : 6 - Type : MALWARE-TOOLS

Nessus® Vulnerability Scanner

Date Description
2015-05-20 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2013-0469-1.nasl - Type : ACT_GATHER_INFO
2013-07-16 Name : The remote device is missing a vendor-supplied security patch.
File : juniper_jsa10580.nasl - Type : ACT_GATHER_INFO
2011-12-14 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_apache2-7882.nasl - Type : ACT_GATHER_INFO
2011-12-13 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_apache2-111130.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BUGTRAQ http://archives.neohapsis.com/archives/bugtraq/2014-02/0061.html
HP http://marc.info/?l=bugtraq&m=133951357207000&w=2
MISC http://orchilles.com/2011/03/ssl-renegotiation-dos.html
http://vincent.bernat.im/en/blog/2011-ssl-dos-mitigation.html
http://www.educatedguesswork.org/2011/10/ssltls_and_computational_dos.html
https://bugzilla.redhat.com/show_bug.cgi?id=707065
MLIST http://www.ietf.org/mail-archive/web/tls/current/msg07553.html
http://www.ietf.org/mail-archive/web/tls/current/msg07564.html
http://www.ietf.org/mail-archive/web/tls/current/msg07567.html
http://www.ietf.org/mail-archive/web/tls/current/msg07576.html
http://www.ietf.org/mail-archive/web/tls/current/msg07577.html
http://www.openwall.com/lists/oss-security/2011/07/08/2
https://lists.apache.org/thread.html/142b93d261e8ac7c5ceffdce848d622404abc1c2...
https://lists.apache.org/thread.html/6121becfdd23f9aeb675d5db80616536277d5931...
https://lists.apache.org/thread.html/8be38d35654441140db8eb3f7433524b3653ac3f...
https://lists.apache.org/thread.html/r1e33410bb5c81536e7fe14b51fa83e7bfd9445d...
https://lists.apache.org/thread.html/r298a09a2b98446b27217d719e877c643b6d13fa...
https://lists.apache.org/thread.html/r77fe575893261889b983e067293be72fa1f8c63...

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
Date Informations
2020-05-23 01:44:18
  • Multiple Updates
2020-05-23 00:28:17
  • Multiple Updates
2019-08-02 12:03:55
  • Multiple Updates
2019-05-27 17:19:19
  • Multiple Updates
2018-08-10 12:02:22
  • Multiple Updates
2016-08-23 09:24:42
  • Multiple Updates
2016-06-28 18:37:04
  • Multiple Updates
2016-04-26 20:41:22
  • Multiple Updates
2015-05-21 13:29:16
  • Multiple Updates
2015-05-12 21:26:37
  • Multiple Updates
2014-02-21 13:21:42
  • Multiple Updates
2014-02-17 11:01:42
  • Multiple Updates
2013-05-10 22:58:21
  • Multiple Updates