Page 11 of 93 results (0.009 seconds)

CVSS: 5.0EPSS: 2%CPEs: 207EXPL: 0

The tor_realloc function in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote attackers to cause a denial of service (daemon crash) via unspecified vectors, related to "underflow errors." La función tor_realloc de Tor en versiones anteriores a la 0.2.1.29 y 0.2.2.x anteriores a la 0.2.2.21-alpha no valida el tamaño de determinado valor durante la reserva de memoria, lo que puede permitir a atacantes remotos provocar una denegación de servicio (caída del demonio) a través de vectores sin especificar. Relacioando con errores de "underflow". • http://archives.seul.org/or/announce/Jan-2011/msg00000.html http://blog.torproject.org/blog/tor-02129-released-security-patches http://www.securityfocus.com/bid/45953 https://exchange.xforce.ibmcloud.com/vulnerabilities/64888 https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog https://trac.torproject.org/projects/tor/ticket/2324 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 2%CPEs: 207EXPL: 0

Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha might allow remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors related to malformed router caches and improper handling of integer values. Tor antes de v0.2.1.29 y v0.2.2.x antes de v0.2.2.21-alfa podría permitir a atacantes remotos provocar una denegación de servicio (error de aserción y salida del demonio) a través de vectores relacionados con caches de Router mal formados y el tratamiento inadecuado de valores enteros. • http://archives.seul.org/or/announce/Jan-2011/msg00000.html http://blog.torproject.org/blog/tor-02129-released-security-patches http://www.securityfocus.com/bid/45953 https://exchange.xforce.ibmcloud.com/vulnerabilities/64864 https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog https://trac.torproject.org/projects/tor/ticket/2352 • CWE-189: Numeric Errors •

CVSS: 5.0EPSS: 2%CPEs: 207EXPL: 0

Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (assertion failure and daemon exit) via blobs that trigger a certain file size, as demonstrated by the cached-descriptors.new file. Tor anterior a v0.2.1.29 y v0.2.2x anterior a 0.2.2.21-alpha permite a atacantes remotos provocar una denegación de servicio (error de aserción y salida demonio) a través de gotas que disparan un tamaño de archivo determinado, como lo demuestra con cached-descriptors.new file. • http://archives.seul.org/or/announce/Jan-2011/msg00000.html http://blog.torproject.org/blog/tor-02129-released-security-patches http://www.securityfocus.com/bid/45953 https://exchange.xforce.ibmcloud.com/vulnerabilities/64867 https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog https://trac.torproject.org/projects/tor/ticket/2326 • CWE-399: Resource Management Errors •

CVSS: 6.8EPSS: 4%CPEs: 207EXPL: 0

Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors. Desbordamiento de búfer basado en memoria dinámica en Tor anterior a v0.2.1.29 y v0.2.2.x anterior a v0.2.2.21-alpha permite a atacantes remotos provocar una denegación de servicio (corrupción de memoria y bloqueo de la aplicación) o posiblemente ejecutar código arbitrario a través de vectores no especificados. • http://archives.seul.org/or/announce/Jan-2011/msg00000.html http://blog.torproject.org/blog/tor-02129-released-security-patches http://secunia.com/advisories/42905 http://secunia.com/advisories/42907 http://www.debian.org/security/2011/dsa-2148 http://www.securityfocus.com/bid/45832 http://www.securitytracker.com/id?1024980 http://www.vupen.com/english/advisories/2011/0131 http://www.vupen.com/english/advisories/2011/0132 https://exchange.xforce.ibmcloud.com/vulnerabilities/64748&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 15%CPEs: 145EXPL: 0

Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors. Desbordamiento de Desbordamiento de búfer basado en montículo en Tor before v0.2.1.28 y v0.2.2.x anterior v0.2.2.20-alpha permite a atacantes remotos causar una denegación de servicio (caída de demonio) o probablemente ejecutar código arbitrario de su elección a través de vectores no especificados. • http://archives.seul.org/or/announce/Dec-2010/msg00000.html http://blog.torproject.org/blog/tor-02128-released-security-patches http://blog.torproject.org/blog/tor-02220-alpha-out-security-patches http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052657.html http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052690.html http://secunia.com/advisories/42536 http://secunia.com/advisories/42667 http://secunia.com/advisories/42783 http://secunia.com/advisories& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •