CVE-2011-5094
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/06/2012
Last modified:
11/04/2025
Description
Mozilla Network Security Services (NSS) 3.x, with certain settings of the SSL_ENABLE_RENEGOTIATION option, does not properly restrict client-initiated renegotiation within the SSL and TLS protocols, which might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection, a different vulnerability than CVE-2011-1473. NOTE: it can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://orchilles.com/2011/03/ssl-renegotiation-dos.html
- http://vincent.bernat.im/en/blog/2011-ssl-dos-mitigation.html
- http://www.educatedguesswork.org/2011/10/ssltls_and_computational_dos.html
- http://www.ietf.org/mail-archive/web/tls/current/msg07553.html
- http://www.ietf.org/mail-archive/web/tls/current/msg07564.html
- http://www.ietf.org/mail-archive/web/tls/current/msg07567.html
- http://www.ietf.org/mail-archive/web/tls/current/msg07576.html
- http://www.ietf.org/mail-archive/web/tls/current/msg07577.html
- http://www.openwall.com/lists/oss-security/2011/07/08/2
- https://bugzilla.redhat.com/show_bug.cgi?id=707065
- http://orchilles.com/2011/03/ssl-renegotiation-dos.html
- http://vincent.bernat.im/en/blog/2011-ssl-dos-mitigation.html
- http://www.educatedguesswork.org/2011/10/ssltls_and_computational_dos.html
- http://www.ietf.org/mail-archive/web/tls/current/msg07553.html
- http://www.ietf.org/mail-archive/web/tls/current/msg07564.html
- http://www.ietf.org/mail-archive/web/tls/current/msg07567.html
- http://www.ietf.org/mail-archive/web/tls/current/msg07576.html
- http://www.ietf.org/mail-archive/web/tls/current/msg07577.html
- http://www.openwall.com/lists/oss-security/2011/07/08/2
- https://bugzilla.redhat.com/show_bug.cgi?id=707065