Vendors/organizations interested in diagnosing exposure of their
OpenSSL-based services to the recently-disclosed sigalgs Dos
vulnerability (CVE-2015-0291) can use mancha's clientnullo tester [1] and
read mancha's brief write-up [2].
[1] http://sf.net/projects/mancha/files/clientnullo.c
[2] https://mancha1.github.io/clientnullo.html
↧
OpenSSL DoS tester now available (CVE-2015-0291)
↧