CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
96.0%
Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors.
Vendor | Product | Version | CPE |
---|---|---|---|
tor | tor | * | cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:* |
tor | tor | 0.0.2 | cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre13 | cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre14 | cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre15 | cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre16 | cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre17 | cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre18 | cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre19 | cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre20 | cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:* |
archives.seul.org/or/announce/Dec-2010/msg00000.html
blog.torproject.org/blog/tor-02128-released-security-patches
blog.torproject.org/blog/tor-02220-alpha-out-security-patches
lists.fedoraproject.org/pipermail/package-announce/2010-December/052657.html
lists.fedoraproject.org/pipermail/package-announce/2010-December/052690.html
secunia.com/advisories/42536
secunia.com/advisories/42667
secunia.com/advisories/42783
secunia.com/advisories/42916
security.gentoo.org/glsa/glsa-201101-02.xml
securitytracker.com/id?1024910
www.debian.org/security/2010/dsa-2136
www.securityfocus.com/bid/45500
www.vupen.com/english/advisories/2010/3290
www.vupen.com/english/advisories/2011/0114
gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog