CVE-2011-2768
- EPSS 0.14%
- Veröffentlicht 23.12.2011 03:59:21
- Zuletzt bearbeitet 11.04.2025 00:51:21
Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of e...
- EPSS 1.59%
- Veröffentlicht 14.06.2011 17:55:05
- Zuletzt bearbeitet 11.04.2025 00:51:21
Buffer overflow in the policy_summarize function in or/policies.c in Tor before 0.2.1.30 allows remote attackers to cause a denial of service (directory authority crash) via a crafted policy that triggers creation of a long port list.
- EPSS 1.38%
- Veröffentlicht 19.01.2011 12:00:21
- Zuletzt bearbeitet 11.04.2025 00:51:21
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha might allow remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors related to malformed router caches and improper handling of integer values.
- EPSS 1.38%
- Veröffentlicht 19.01.2011 12:00:20
- Zuletzt bearbeitet 11.04.2025 00:51:21
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (assertion failure and daemon exit) via blobs that trigger a certain file size, as demonstrated by the cached-descriptors.new file.
- EPSS 1.38%
- Veröffentlicht 19.01.2011 12:00:20
- Zuletzt bearbeitet 11.04.2025 00:51:21
The tor_realloc function in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote attackers to cause a denial of service (daemon crash) via unspecified vectors,...
- EPSS 1.38%
- Veröffentlicht 19.01.2011 12:00:19
- Zuletzt bearbeitet 11.04.2025 00:51:21
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha makes calls to Libevent within Libevent log handlers, which might allow remote attackers to cause a denial of service (daemon crash) via vectors that trigger certain log messages.
CVE-2011-0427
- EPSS 5.92%
- Veröffentlicht 19.01.2011 12:00:19
- Zuletzt bearbeitet 11.04.2025 00:51:21
Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
CVE-2011-0016
- EPSS 0.06%
- Veröffentlicht 19.01.2011 12:00:19
- Zuletzt bearbeitet 11.04.2025 00:51:21
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly manage key data in memory, which might allow local users to obtain sensitive information by leveraging the ability to read memory that was previously used by a different process.
- EPSS 2.35%
- Veröffentlicht 19.01.2011 12:00:06
- Zuletzt bearbeitet 11.04.2025 00:51:21
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly check the amount of compression in zlib-compressed data, which allows remote attackers to cause a denial of service via a large compression factor.
- EPSS 12.37%
- Veröffentlicht 22.12.2010 01:00:02
- Zuletzt bearbeitet 11.04.2025 00:51:21
Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors.