- EPSS 0.47%
- Veröffentlicht 03.02.2014 03:55:03
- Zuletzt bearbeitet 11.04.2025 00:51:21
Tor before 0.2.3.24-rc allows remote attackers to cause a denial of service (assertion failure and daemon exit) by performing link protocol negotiation incorrectly.
- EPSS 0.47%
- Veröffentlicht 03.02.2014 03:55:03
- Zuletzt bearbeitet 11.04.2025 00:51:21
Tor before 0.2.3.23-rc allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a renegotiation attempt that occurs after the initiation of the V3 link protocol.
- EPSS 0.13%
- Veröffentlicht 17.01.2014 21:55:14
- Zuletzt bearbeitet 11.04.2025 00:51:21
Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity ke...
- EPSS 2.48%
- Veröffentlicht 01.01.2013 12:35:14
- Zuletzt bearbeitet 11.04.2025 00:51:21
The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell r...
- EPSS 1.62%
- Veröffentlicht 14.09.2012 18:55:04
- Zuletzt bearbeitet 11.04.2025 00:51:21
The compare_tor_addr_to_addr_policy function in or/policies.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.21-rc, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a zero-valued port field that is not pr...
- EPSS 5.59%
- Veröffentlicht 14.09.2012 18:55:04
- Zuletzt bearbeitet 11.04.2025 00:51:21
The tor_timegm function in common/util.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.22-rc, does not properly validate time values, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed di...