Page 4 of 40 results (0.012 seconds)

CVSS: 7.5EPSS: 95%CPEs: 26EXPL: 8

01 Dec 2016 — A use-after-free vulnerability in SVG Animation has been discovered. An exploit built on this vulnerability has been discovered in the wild targeting Firefox and Tor Browser users on Windows. This vulnerability affects Firefox < 50.0.2, Firefox ESR < 45.5.1, and Thunderbird < 45.5.1. Se ha descubierto una vulnerabilidad de uso de memoria previamente liberada en SVG Animation. Se ha descubierto un exploit construido sobre esta vulnerabilidad "in the wild" que apunta a usuarios de Firefox y Tor Browser en Win... • https://packetstorm.news/files/id/140696 • CWE-416: Use After Free •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

06 Apr 2015 — The Hidden Service (HS) server implementation in Tor before 0.2.4.27, 0.2.5.x before 0.2.5.12, and 0.2.6.x before 0.2.6.7 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via unspecified vectors. La implementación del servidor Hidden Service (HS) en Tor versiones anteriores a 0.2.4.27, versiones 0.2.5.x anteriores a 0.2.5.12 y versiones 0.2.6.x anteriores a 0.2.6.7, permite a atacantes remotos causar una denegación de servicio (falla de aserción y salida del demonio )... • http://openwall.com/lists/oss-security/2015/04/06/5 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

06 Apr 2015 — The Hidden Service (HS) client implementation in Tor before 0.2.4.27, 0.2.5.x before 0.2.5.12, and 0.2.6.x before 0.2.6.7 allows remote servers to cause a denial of service (assertion failure and application exit) via a malformed HS descriptor. La implementación del cliente Hidden Service (HS) en Tor versiones anteriores a 0.2.4.27, versiones 0.2.5.x anteriores a 0.2.5.12 y versiones 0.2.6.x anteriores a 0.2.6.7, permite a los servidores remotos causar una denegación de servicio (falla de aserción y salida ... • http://openwall.com/lists/oss-security/2015/04/06/5 •

CVSS: 5.8EPSS: 0%CPEs: 124EXPL: 0

30 Jul 2014 — Tor before 0.2.4.23 and 0.2.5 before 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote attackers to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a means of communicating information about hidden service names. Tor anterior a 0.2.4.23 y 0.2.5 anterior a 0.2.5.6-alpha mantiene un circuito después de que un cliente reciba una célula RELAY_EARLY entrante, lo que facilita a atacantes remotos... • http://secunia.com/advisories/60084 •

CVSS: 7.5EPSS: 0%CPEs: 97EXPL: 0

03 Feb 2014 — Tor before 0.2.3.23-rc allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a renegotiation attempt that occurs after the initiation of the V3 link protocol. Tor anterior a 0.2.3.23-rc permite a atacantes remotos causar una denegación de servicio (fallo de aserción y cierre de demonio) a través de un intento de renegociación que se produce después de la iniciación del procolo de enlace V3. • https://gitweb.torproject.org/tor.git?a=blob_plain%3Bhb=HEAD%3Bf=ChangeLog •

CVSS: 7.5EPSS: 0%CPEs: 98EXPL: 0

03 Feb 2014 — Tor before 0.2.3.24-rc allows remote attackers to cause a denial of service (assertion failure and daemon exit) by performing link protocol negotiation incorrectly. Tor anterior a 0.2.3.24-rc permite a atacantes remotos causar una denegación de servicio (fallo de aserción y cierre de demonio) mediante la realización de la negociación del protocolo de enlace de forma incorrecta. • https://gitweb.torproject.org/tor.git?a=blob_plain%3Bhb=HEAD%3Bf=ChangeLog •

CVSS: 7.5EPSS: 0%CPEs: 19EXPL: 0

17 Jan 2014 — Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors. Tor anteriores a 0.2.4.20, cuando OpenSSL 1.x es utilizado en conjunción con cierto ajuste de HardwareAccel en las plataformas Intel Sandy ... • http://lists.opensuse.org/opensuse-updates/2014-01/msg00095.html • CWE-310: Cryptographic Issues •

CVSS: 7.5EPSS: 4%CPEs: 99EXPL: 0

01 Jan 2013 — The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell reception rate) or bypass intended flow-control restrictions via a RELAY_COMMAND_SENDME command. La función connection_edge_process_relay_cell en o/relay.c en Tor antes de v0.2.3.25 mantiene circuitos incluso si llega una célula SendMe llega, lo que podría permit... • http://openwall.com/lists/oss-security/2012/11/26/11 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 2%CPEs: 96EXPL: 0

14 Sep 2012 — The tor_timegm function in common/util.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.22-rc, does not properly validate time values, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed directory object, a different vulnerability than CVE-2012-4419. La función tor_timegm en común/util.c en Tor v0.2.2.39 antes, y antes de v0.2.3.x v0.2.3.22-rc, no valida correctamente los valores de tiempo, lo que permite a atacantes remotos provocar una denegació... • http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 3%CPEs: 95EXPL: 0

14 Sep 2012 — The compare_tor_addr_to_addr_policy function in or/policies.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.21-rc, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a zero-valued port field that is not properly handled during policy comparison. La función compare_tor_addr_to_addr_policy en or/policies.c en Tor antes de v0.2.2.39 y v0.2.3.x antes de v0.2.3.21-rc, permite a atacantes remotos provocar una denegación de servicio (error de aserción y salida del demon... • http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html •