First published: Sun Mar 13 2011(Updated: )
** DISPUTED ** OpenSSL before 0.9.8l, and 0.9.8m through 1.x, does not properly restrict client-initiated renegotiation within the SSL and TLS protocols, which might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection, a different vulnerability than CVE-2011-5094. NOTE: it can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | =0.9.8m | |
OpenSSL libcrypto | =0.9.8m-beta1 | |
OpenSSL libcrypto | =0.9.8n | |
OpenSSL libcrypto | =0.9.8o | |
OpenSSL libcrypto | =0.9.8p | |
OpenSSL libcrypto | =0.9.8r | |
OpenSSL libcrypto | =0.9.8s | |
OpenSSL libcrypto | =0.9.8t | |
OpenSSL libcrypto | =0.9.8u | |
OpenSSL libcrypto | =0.9.8v | |
OpenSSL libcrypto | =0.9.8w | |
OpenSSL libcrypto | =0.9.8x | |
OpenSSL libcrypto | <=0.9.8k |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1473 has a designation that indicates a denial of service vulnerability potentially affecting server performance.
To mitigate CVE-2011-1473, upgrade OpenSSL to a version that is newer than 0.9.8l.
CVE-2011-1473 affects multiple versions of OpenSSL including 0.9.8k and earlier versions.
Yes, CVE-2011-1473 can be exploited remotely, allowing attackers to initiate numerous renegotiations.
Exploiting CVE-2011-1473 may lead to denial of service through excessive CPU consumption due to continuous renegotiations.