CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
87.6%
Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration.
Vendor | Product | Version | CPE |
---|---|---|---|
tor | tor | * | cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:* |
tor | tor | 0.0.2 | cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:* |
tor | tor | 0.0.3 | cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:* |
tor | tor | 0.0.4 | cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:* |
tor | tor | 0.0.5 | cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:* |
tor | tor | 0.0.6 | cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:* |
tor | tor | 0.0.6.1 | cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:* |
tor | tor | 0.0.6.2 | cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:* |
tor | tor | 0.0.7 | cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:* |
tor | tor | 0.0.7.1 | cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:* |