Tor

Tor

58 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.14%
  • Veröffentlicht 23.12.2011 03:59:21
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of e...

  • EPSS 1.59%
  • Veröffentlicht 14.06.2011 17:55:05
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Buffer overflow in the policy_summarize function in or/policies.c in Tor before 0.2.1.30 allows remote attackers to cause a denial of service (directory authority crash) via a crafted policy that triggers creation of a long port list.

  • EPSS 1.38%
  • Veröffentlicht 19.01.2011 12:00:21
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha might allow remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors related to malformed router caches and improper handling of integer values.

  • EPSS 1.38%
  • Veröffentlicht 19.01.2011 12:00:20
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (assertion failure and daemon exit) via blobs that trigger a certain file size, as demonstrated by the cached-descriptors.new file.

  • EPSS 1.38%
  • Veröffentlicht 19.01.2011 12:00:20
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The tor_realloc function in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote attackers to cause a denial of service (daemon crash) via unspecified vectors,...

  • EPSS 1.38%
  • Veröffentlicht 19.01.2011 12:00:19
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha makes calls to Libevent within Libevent log handlers, which might allow remote attackers to cause a denial of service (daemon crash) via vectors that trigger certain log messages.

  • EPSS 5.92%
  • Veröffentlicht 19.01.2011 12:00:19
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.

  • EPSS 0.06%
  • Veröffentlicht 19.01.2011 12:00:19
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly manage key data in memory, which might allow local users to obtain sensitive information by leveraging the ability to read memory that was previously used by a different process.

  • EPSS 2.35%
  • Veröffentlicht 19.01.2011 12:00:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly check the amount of compression in zlib-compressed data, which allows remote attackers to cause a denial of service via a large compression factor.

  • EPSS 12.37%
  • Veröffentlicht 22.12.2010 01:00:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors.