CVE-2011-1924
https://notcve.org/view.php?id=CVE-2011-1924
Buffer overflow in the policy_summarize function in or/policies.c in Tor before 0.2.1.30 allows remote attackers to cause a denial of service (directory authority crash) via a crafted policy that triggers creation of a long port list. Desbordamiento de búfer en la función policy_summarize en or/policies.c en Tor antes de v0.2.1.30 permite a atacantes remotos causar una denegación de servicio (caída de la autoridad de directorio) a través de una política manipulada que provoca la creación de una lista de puertos largos. • http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061258.html http://secunia.com/advisories/43548 http://secunia.com/advisories/44862 http://www.securityfocus.com/bid/46618 https://bugzilla.redhat.com/show_bug.cgi?id=705192 https://bugzilla.redhat.com/show_bug.cgi?id=705194 https://gitweb.torproject.org/tor.git/commit/43414eb98821d3b5c6c65181d7545ce938f82c8e https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2011-0490
https://notcve.org/view.php?id=CVE-2011-0490
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha makes calls to Libevent within Libevent log handlers, which might allow remote attackers to cause a denial of service (daemon crash) via vectors that trigger certain log messages. Tor antes de v0.2.1.29 y v0.2.2.x antes de v0.2.2.21-alfa realiza llamadas a libevent dentro de manejadores de log de libevent, que podría permitir a atacantes remotos provocar una denegación de servicio (por caída del demonio) a través de vectores que lanzan ciertos mensajes de log. • http://archives.seul.org/or/announce/Jan-2011/msg00000.html http://blog.torproject.org/blog/tor-02129-released-security-patches http://www.securityfocus.com/bid/45953 https://exchange.xforce.ibmcloud.com/vulnerabilities/64889 https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog https://trac.torproject.org/projects/tor/ticket/2190 •
CVE-2011-0016
https://notcve.org/view.php?id=CVE-2011-0016
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly manage key data in memory, which might allow local users to obtain sensitive information by leveraging the ability to read memory that was previously used by a different process. Tor en versiones anteriores a la 0.2.1.29 y 0.2.2.x anteriores a la 0.2.2.21-alpha no gestiona apropiadamente datos de clave en memoria, lo que puede permitir a usuarios locales obtener información confidencial a través de la lectura de memoria que ha sido utilizada previamente por un proceso diferente. • http://archives.seul.org/or/announce/Jan-2011/msg00000.html http://blog.torproject.org/blog/tor-02129-released-security-patches http://secunia.com/advisories/42905 http://secunia.com/advisories/42907 http://www.debian.org/security/2011/dsa-2148 http://www.openwall.com/lists/oss-security/2011/01/18/7 http://www.securityfocus.com/bid/45832 http://www.securitytracker.com/id?1024980 http://www.vupen.com/english/advisories/2011/0131 http://www.vupen.com/english/advisories/ • CWE-399: Resource Management Errors •
CVE-2011-0015
https://notcve.org/view.php?id=CVE-2011-0015
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly check the amount of compression in zlib-compressed data, which allows remote attackers to cause a denial of service via a large compression factor. Tor antes de v0.2.1.29 y v0.2.2.x antes de v0.2.2.21-alfa no comprueba correctamente el nivel de compresión de datos de zlib, lo que permite a atacantes remotos provocar una denegación de servicio a través de un factor de compresión de gran tamaño. • http://archives.seul.org/or/announce/Jan-2011/msg00000.html http://blog.torproject.org/blog/tor-02129-released-security-patches http://secunia.com/advisories/42905 http://secunia.com/advisories/42907 http://www.debian.org/security/2011/dsa-2148 http://www.openwall.com/lists/oss-security/2011/01/18/7 http://www.securityfocus.com/bid/45832 http://www.securitytracker.com/id?1024980 http://www.vupen.com/english/advisories/2011/0131 http://www.vupen.com/english/advisories/ • CWE-20: Improper Input Validation •
CVE-2011-0491
https://notcve.org/view.php?id=CVE-2011-0491
The tor_realloc function in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote attackers to cause a denial of service (daemon crash) via unspecified vectors, related to "underflow errors." La función tor_realloc de Tor en versiones anteriores a la 0.2.1.29 y 0.2.2.x anteriores a la 0.2.2.21-alpha no valida el tamaño de determinado valor durante la reserva de memoria, lo que puede permitir a atacantes remotos provocar una denegación de servicio (caída del demonio) a través de vectores sin especificar. Relacioando con errores de "underflow". • http://archives.seul.org/or/announce/Jan-2011/msg00000.html http://blog.torproject.org/blog/tor-02129-released-security-patches http://www.securityfocus.com/bid/45953 https://exchange.xforce.ibmcloud.com/vulnerabilities/64888 https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog https://trac.torproject.org/projects/tor/ticket/2324 • CWE-20: Improper Input Validation •