Tor

Tor

58 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 18.09.2025 13:58:52
  • Zuletzt bearbeitet 19.09.2025 16:00:27

A security flaw has been discovered in Tor up to 0.4.7.16/0.4.8.17. Impacted is an unknown function of the component Onion Service Descriptor Handler. Performing manipulation results in resource consumption. The attack may be initiated remotely. The ...

  • EPSS 0.64%
  • Veröffentlicht 26.08.2012 03:17:44
  • Zuletzt bearbeitet 11.04.2025 00:51:21

routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack...

  • EPSS 1.46%
  • Veröffentlicht 26.08.2012 03:17:44
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted ...

  • EPSS 1.46%
  • Veröffentlicht 26.08.2012 03:17:44
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests.

  • EPSS 0.25%
  • Veröffentlicht 23.12.2011 03:59:22
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Tor before 0.2.2.25-alpha, when configured as a relay without the Nickname configuration option, uses the local hostname as the Nickname value, which allows remote attackers to obtain potentially sensitive information by reading this value.

  • EPSS 0.25%
  • Veröffentlicht 23.12.2011 03:59:22
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitorin...

  • EPSS 0.25%
  • Veröffentlicht 23.12.2011 03:59:22
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.

  • EPSS 0.25%
  • Veröffentlicht 23.12.2011 03:59:22
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Tor before 0.2.2.34, when configured as a bridge, uses direct DirPort access instead of a Tor TLS connection for a directory fetch, which makes it easier for remote attackers to enumerate bridges by observing DirPort connections.

  • EPSS 3.51%
  • Veröffentlicht 23.12.2011 03:59:22
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy...

  • EPSS 0.26%
  • Veröffentlicht 23.12.2011 03:59:21
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values.