
CVE-2015-2929 – Mandriva Linux Security Advisory 2015-205
https://notcve.org/view.php?id=CVE-2015-2929
06 Apr 2015 — The Hidden Service (HS) client implementation in Tor before 0.2.4.27, 0.2.5.x before 0.2.5.12, and 0.2.6.x before 0.2.6.7 allows remote servers to cause a denial of service (assertion failure and application exit) via a malformed HS descriptor. La implementación del cliente Hidden Service (HS) en Tor versiones anteriores a 0.2.4.27, versiones 0.2.5.x anteriores a 0.2.5.12 y versiones 0.2.6.x anteriores a 0.2.6.7, permite a los servidores remotos causar una denegación de servicio (falla de aserción y salida ... • http://openwall.com/lists/oss-security/2015/04/06/5 •

CVE-2014-5117 – Debian Security Advisory 2993-1
https://notcve.org/view.php?id=CVE-2014-5117
30 Jul 2014 — Tor before 0.2.4.23 and 0.2.5 before 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote attackers to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a means of communicating information about hidden service names. Tor anterior a 0.2.4.23 y 0.2.5 anterior a 0.2.5.6-alpha mantiene un circuito después de que un cliente reciba una célula RELAY_EARLY entrante, lo que facilita a atacantes remotos... • http://secunia.com/advisories/60084 •

CVE-2012-2249
https://notcve.org/view.php?id=CVE-2012-2249
03 Feb 2014 — Tor before 0.2.3.23-rc allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a renegotiation attempt that occurs after the initiation of the V3 link protocol. Tor anterior a 0.2.3.23-rc permite a atacantes remotos causar una denegación de servicio (fallo de aserción y cierre de demonio) a través de un intento de renegociación que se produce después de la iniciación del procolo de enlace V3. • https://gitweb.torproject.org/tor.git?a=blob_plain%3Bhb=HEAD%3Bf=ChangeLog •

CVE-2012-2250
https://notcve.org/view.php?id=CVE-2012-2250
03 Feb 2014 — Tor before 0.2.3.24-rc allows remote attackers to cause a denial of service (assertion failure and daemon exit) by performing link protocol negotiation incorrectly. Tor anterior a 0.2.3.24-rc permite a atacantes remotos causar una denegación de servicio (fallo de aserción y cierre de demonio) mediante la realización de la negociación del protocolo de enlace de forma incorrecta. • https://gitweb.torproject.org/tor.git?a=blob_plain%3Bhb=HEAD%3Bf=ChangeLog •

CVE-2013-7295 – Mandriva Linux Security Advisory 2014-123
https://notcve.org/view.php?id=CVE-2013-7295
17 Jan 2014 — Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors. Tor anteriores a 0.2.4.20, cuando OpenSSL 1.x es utilizado en conjunción con cierto ajuste de HardwareAccel en las plataformas Intel Sandy ... • http://lists.opensuse.org/opensuse-updates/2014-01/msg00095.html • CWE-310: Cryptographic Issues •

CVE-2012-5573
https://notcve.org/view.php?id=CVE-2012-5573
01 Jan 2013 — The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell reception rate) or bypass intended flow-control restrictions via a RELAY_COMMAND_SENDME command. La función connection_edge_process_relay_cell en o/relay.c en Tor antes de v0.2.3.25 mantiene circuitos incluso si llega una célula SendMe llega, lo que podría permit... • http://openwall.com/lists/oss-security/2012/11/26/11 • CWE-399: Resource Management Errors •

CVE-2012-4922
https://notcve.org/view.php?id=CVE-2012-4922
14 Sep 2012 — The tor_timegm function in common/util.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.22-rc, does not properly validate time values, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed directory object, a different vulnerability than CVE-2012-4419. La función tor_timegm en común/util.c en Tor v0.2.2.39 antes, y antes de v0.2.3.x v0.2.3.22-rc, no valida correctamente los valores de tiempo, lo que permite a atacantes remotos provocar una denegació... • http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html • CWE-20: Improper Input Validation •

CVE-2012-4419
https://notcve.org/view.php?id=CVE-2012-4419
14 Sep 2012 — The compare_tor_addr_to_addr_policy function in or/policies.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.21-rc, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a zero-valued port field that is not properly handled during policy comparison. La función compare_tor_addr_to_addr_policy en or/policies.c en Tor antes de v0.2.2.39 y v0.2.3.x antes de v0.2.3.21-rc, permite a atacantes remotos provocar una denegación de servicio (error de aserción y salida del demon... • http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html •

CVE-2012-3519
https://notcve.org/view.php?id=CVE-2012-3519
26 Aug 2012 — routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack. routerlist.c en Tor anterior a v0.2.2.38 utiliza una cantidad diferente de tiempo para la iteración relay-list dependiendo de que (relay) sea elegido, lo cual podría permitir a atacantes remotos obtener información sensible sobre la selección del (relay) a tra... • http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2012-3517
https://notcve.org/view.php?id=CVE-2012-3517
26 Aug 2012 — Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests. Vulnerabilidad de liberación después de uso en dns.c en Tor anterior a 0.2.2.38 podría permitir a atacantes remotos causar una denegación de servicio (caída del demonio) a través de vectores relacionados con solicitudes fallidas de DNS. • http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html • CWE-399: Resource Management Errors •