
CVE-2012-5573
https://notcve.org/view.php?id=CVE-2012-5573
01 Jan 2013 — The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell reception rate) or bypass intended flow-control restrictions via a RELAY_COMMAND_SENDME command. La función connection_edge_process_relay_cell en o/relay.c en Tor antes de v0.2.3.25 mantiene circuitos incluso si llega una célula SendMe llega, lo que podría permit... • http://openwall.com/lists/oss-security/2012/11/26/11 • CWE-399: Resource Management Errors •

CVE-2012-4419
https://notcve.org/view.php?id=CVE-2012-4419
14 Sep 2012 — The compare_tor_addr_to_addr_policy function in or/policies.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.21-rc, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a zero-valued port field that is not properly handled during policy comparison. La función compare_tor_addr_to_addr_policy en or/policies.c en Tor antes de v0.2.2.39 y v0.2.3.x antes de v0.2.3.21-rc, permite a atacantes remotos provocar una denegación de servicio (error de aserción y salida del demon... • http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html •

CVE-2012-4922
https://notcve.org/view.php?id=CVE-2012-4922
14 Sep 2012 — The tor_timegm function in common/util.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.22-rc, does not properly validate time values, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed directory object, a different vulnerability than CVE-2012-4419. La función tor_timegm en común/util.c en Tor v0.2.2.39 antes, y antes de v0.2.3.x v0.2.3.22-rc, no valida correctamente los valores de tiempo, lo que permite a atacantes remotos provocar una denegació... • http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html • CWE-20: Improper Input Validation •

CVE-2012-3517
https://notcve.org/view.php?id=CVE-2012-3517
26 Aug 2012 — Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests. Vulnerabilidad de liberación después de uso en dns.c en Tor anterior a 0.2.2.38 podría permitir a atacantes remotos causar una denegación de servicio (caída del demonio) a través de vectores relacionados con solicitudes fallidas de DNS. • http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html • CWE-399: Resource Management Errors •

CVE-2012-3518
https://notcve.org/view.php?id=CVE-2012-3518
26 Aug 2012 — The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted (1) vote document or (2) consensus document. La función networkstatus_parse_vote_from_string en routerparse.c en Tor anterior a v0.2.2.38 no maneja adecuadamente un (flavor name), lo cual podría permitir a atacantes remotos causar una denegación de servicio (lec... • http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2012-3519
https://notcve.org/view.php?id=CVE-2012-3519
26 Aug 2012 — routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack. routerlist.c en Tor anterior a v0.2.2.38 utiliza una cantidad diferente de tiempo para la iteración relay-list dependiendo de que (relay) sea elegido, lo cual podría permitir a atacantes remotos obtener información sensible sobre la selección del (relay) a tra... • http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •