OpenSSL before 0.9.8l, and 0.9.8m through 1.x, does not properly restrict client-initiated renegotiation within the SSL and TLS protocols, which might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection, a different vulnerability than CVE-2011-5094. NOTE: it can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment
https://bugzilla.redhat.com/show_bug.cgi?id=707065
http://www.openwall.com/lists/oss-security/2011/07/08/2
http://www.ietf.org/mail-archive/web/tls/current/msg07577.html
http://www.ietf.org/mail-archive/web/tls/current/msg07576.html
http://www.ietf.org/mail-archive/web/tls/current/msg07567.html
http://www.ietf.org/mail-archive/web/tls/current/msg07564.html
http://www.ietf.org/mail-archive/web/tls/current/msg07553.html
http://www.educatedguesswork.org/2011/10/ssltls_and_computational_dos.html
http://vincent.bernat.im/en/blog/2011-ssl-dos-mitigation.html
http://orchilles.com/2011/03/ssl-renegotiation-dos.html
http://marc.info/?l=bugtraq&m=133951357207000&w=2
http://archives.neohapsis.com/archives/bugtraq/2014-02/0061.html