From 37dece862d17040204823cb2fd337eafba452ac6 Mon Sep 17 00:00:00 2001 From: sandro gauci Date: Mon, 27 Jan 2025 10:06:33 +0100 Subject: [PATCH] update references for ClientHello DoS --- 5.0/en/0x53-V53-WebRTC.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/5.0/en/0x53-V53-WebRTC.md b/5.0/en/0x53-V53-WebRTC.md index 513df922f1..c43a4fed33 100644 --- a/5.0/en/0x53-V53-WebRTC.md +++ b/5.0/en/0x53-V53-WebRTC.md @@ -70,4 +70,4 @@ For more information, see also: * [RFC 8825 - Overview: Real-Time Protocols for Browser-Based Applications](https://www.rfc-editor.org/info/rfc8825) * [RFC 8826 - Security Considerations for WebRTC](https://www.rfc-editor.org/info/rfc8826) * [RFC 8827 - WebRTC Security Architecture](https://www.rfc-editor.org/info/rfc8827) -* WebRTC DTLS ClientHello DoS: [A Novel DoS Vulnerability affecting WebRTC Media Servers, Enable Security](https://www.rtcsec.com/article/novel-dos-vulnerability-affecting-webrtc-media-servers/) +* The WebRTC DTLS ClientHello DoS is best documented at [Enable Security's blog post aimed at security professionals](https://www.enablesecurity.com/blog/novel-dos-vulnerability-affecting-webrtc-media-servers/) and the associated [white paper aimed at WebRTC developers](https://www.enablesecurity.com/blog/webrtc-hello-race-conditions-paper/)