7.5
CVE-2015-2689
- EPSS 0.65%
- Veröffentlicht 24.01.2020 18:15:12
- Zuletzt bearbeitet 21.11.2024 02:27:51
- Quelle security@debian.org
- CVE-Watchlists
- Unerledigt
Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle pending-connection resolve states during periods of high DNS load, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Torproject ≫ Tor Version < 0.2.4.26
Torproject ≫ Tor Version >= 0.2.5.1 < 0.2.5.11
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.65% | 0.683 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
| nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.