CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
EPSS
Percentile
87.6%
Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | tor | < 0.2.2.35-1 | tor_0.2.2.35-1_all.deb |
Debian | 11 | all | tor | < 0.2.2.35-1 | tor_0.2.2.35-1_all.deb |
Debian | 999 | all | tor | < 0.2.2.35-1 | tor_0.2.2.35-1_all.deb |
Debian | 13 | all | tor | < 0.2.2.35-1 | tor_0.2.2.35-1_all.deb |