CVE-2011-2778
https://notcve.org/view.php?id=CVE-2011-2778
Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration. Múltiples desbordamientos de buffer de memoria dinámica en versiones anteriores a v0.2.2.35 de Tor que permite a atacantes remotos causar una denegación de servicio (corrupción de memoria) o una posible ejecución de código de su elección mediante (1) el establecimiento de una conexión STOKS a un puerto SocksPort o (2) aprovechando una configuración de proxy STOKS. • http://www.debian.org/security/2011/dsa-2363 https://blog.torproject.org/blog/tor-02235-released-security-patches • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2011-2769
https://notcve.org/view.php?id=CVE-2011-2769
Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values. Tor antes de v0.2.2.34, cuando se configura como bridge, acepta los valores CREATE y CREATE_FAST en el campo Command de una conexión OR que inicializa, lo que permite a relays remotos enumerar bridges usando esos valores. • http://www.debian.org/security/2011/dsa-2331 https://blog.torproject.org/blog/tor-02234-released-security-patches • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2011-2768
https://notcve.org/view.php?id=CVE-2011-2768
Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected. Tor, antes de v0.2.2.34, cuando se configura como cliente o bridge, envía una cadena de certificado TLS como parte de una conexión saliente OR, lo que permite a relays remotos evitar la anonimidad intencionada cuando se determina un conjunto de guardas de entrada seleccionadas por el cliente o bridge. • http://www.debian.org/security/2011/dsa-2331 https://blog.torproject.org/blog/tor-02234-released-security-patches • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2011-0490
https://notcve.org/view.php?id=CVE-2011-0490
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha makes calls to Libevent within Libevent log handlers, which might allow remote attackers to cause a denial of service (daemon crash) via vectors that trigger certain log messages. Tor antes de v0.2.1.29 y v0.2.2.x antes de v0.2.2.21-alfa realiza llamadas a libevent dentro de manejadores de log de libevent, que podría permitir a atacantes remotos provocar una denegación de servicio (por caída del demonio) a través de vectores que lanzan ciertos mensajes de log. • http://archives.seul.org/or/announce/Jan-2011/msg00000.html http://blog.torproject.org/blog/tor-02129-released-security-patches http://www.securityfocus.com/bid/45953 https://exchange.xforce.ibmcloud.com/vulnerabilities/64889 https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog https://trac.torproject.org/projects/tor/ticket/2190 •
CVE-2011-0016
https://notcve.org/view.php?id=CVE-2011-0016
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly manage key data in memory, which might allow local users to obtain sensitive information by leveraging the ability to read memory that was previously used by a different process. Tor en versiones anteriores a la 0.2.1.29 y 0.2.2.x anteriores a la 0.2.2.21-alpha no gestiona apropiadamente datos de clave en memoria, lo que puede permitir a usuarios locales obtener información confidencial a través de la lectura de memoria que ha sido utilizada previamente por un proceso diferente. • http://archives.seul.org/or/announce/Jan-2011/msg00000.html http://blog.torproject.org/blog/tor-02129-released-security-patches http://secunia.com/advisories/42905 http://secunia.com/advisories/42907 http://www.debian.org/security/2011/dsa-2148 http://www.openwall.com/lists/oss-security/2011/01/18/7 http://www.securityfocus.com/bid/45832 http://www.securitytracker.com/id?1024980 http://www.vupen.com/english/advisories/2011/0131 http://www.vupen.com/english/advisories/ • CWE-399: Resource Management Errors •