Torproject

Tor

42 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.6%
  • Veröffentlicht 30.08.2021 05:15:07
  • Zuletzt bearbeitet 21.11.2024 06:16:57

Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship between batch-signature verification and single-signature verification, leading to a remote assertion failure, aka TROVE-2021-007.

  • EPSS 0.83%
  • Veröffentlicht 29.06.2021 12:15:08
  • Zuletzt bearbeitet 21.11.2024 06:10:39

An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006. The v3 onion service descriptor parsing allows out-of-bounds memory access, and a client crash, via a crafted onion service descriptor

  • EPSS 0.65%
  • Veröffentlicht 29.06.2021 12:15:08
  • Zuletzt bearbeitet 21.11.2024 06:10:39

An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency.

  • EPSS 0.09%
  • Veröffentlicht 29.06.2021 11:15:07
  • Zuletzt bearbeitet 21.11.2024 06:10:38

An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream.

  • EPSS 2%
  • Veröffentlicht 19.03.2021 05:15:12
  • Zuletzt bearbeitet 21.11.2024 05:59:04

Tor before 0.4.5.7 allows a remote attacker to cause Tor directory authorities to exit with an assertion failure, aka TROVE-2021-002.

  • EPSS 1.25%
  • Veröffentlicht 19.03.2021 05:15:12
  • Zuletzt bearbeitet 21.11.2024 05:59:04

Tor before 0.4.5.7 allows a remote participant in the Tor directory protocol to exhaust CPU resources on a target, aka TROVE-2021-001.

  • EPSS 0.51%
  • Veröffentlicht 15.07.2020 17:15:11
  • Zuletzt bearbeitet 21.11.2024 05:05:46

Tor before 0.4.3.6 has an out-of-bounds memory access that allows a remote denial-of-service (crash) attack against Tor instances built to use Mozilla Network Security Services (NSS), aka TROVE-2020-001.

  • EPSS 1.22%
  • Veröffentlicht 23.03.2020 13:15:13
  • Zuletzt bearbeitet 21.11.2024 04:55:39

Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (memory leak), aka TROVE-2020-004. This occurs in circpad_setup_machine_on_circ because a circuit-padding machine can be negoti...

  • EPSS 2%
  • Veröffentlicht 23.03.2020 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:55:39

Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (CPU consumption), aka TROVE-2020-002.

Exploit
  • EPSS 1.12%
  • Veröffentlicht 02.02.2020 13:15:10
  • Zuletzt bearbeitet 21.11.2024 05:38:58

The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team ...