CVE-2017-8821
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, an attacker can cause a denial of service (application hang) via crafted PEM input that signifies a public key requiring a password, which triggers an attempt by the OpenSSL library to ask the user for the password, aka TROVE-2017-011.
En Tor, en versiones anteriores a la 0.2.5.16; de la versión 0.2.6 hasta la 0.2.8 anterior a la 0.2.8.17; versiones 0.2.9 anteriores a la 0.2.9.14; versiones 0.3.0 anteriores a la 0.3.0.13 y versiones 0.3.1 anteriores a la 0.3.1.9, un atacante puede provocar una denegación de servicio (bloqueo de la aplicación) mediante una entrada PEM manipulada que represente una clave pública que requiera una contraseña. Esto da lugar a que la biblioteca Open SSLE intente preguntar la contraseña al usuario. Esto también se conoce como TROVE-2017-011.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-05-07 CVE Reserved
- 2017-12-03 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516 | 2017-12-21 | |
https://bugs.torproject.org/24246 | 2017-12-21 | |
https://www.debian.org/security/2017/dsa-4054 | 2017-12-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tor Project Search vendor "Tor Project" | Tor Search vendor "Tor Project" for product "Tor" | < 0.2.5.16 Search vendor "Tor Project" for product "Tor" and version " < 0.2.5.16" | - |
Affected
| ||||||
Tor Project Search vendor "Tor Project" | Tor Search vendor "Tor Project" for product "Tor" | >= 0.2.6 < 0.2.8.17 Search vendor "Tor Project" for product "Tor" and version " >= 0.2.6 < 0.2.8.17" | - |
Affected
| ||||||
Tor Project Search vendor "Tor Project" | Tor Search vendor "Tor Project" for product "Tor" | >= 0.2.9 < 0.2.9.14 Search vendor "Tor Project" for product "Tor" and version " >= 0.2.9 < 0.2.9.14" | - |
Affected
| ||||||
Tor Project Search vendor "Tor Project" | Tor Search vendor "Tor Project" for product "Tor" | >= 0.3.0 < 0.3.0.13 Search vendor "Tor Project" for product "Tor" and version " >= 0.3.0 < 0.3.0.13" | - |
Affected
| ||||||
Tor Project Search vendor "Tor Project" | Tor Search vendor "Tor Project" for product "Tor" | >= 0.3.1 < 0.3.1.9 Search vendor "Tor Project" for product "Tor" and version " >= 0.3.1 < 0.3.1.9" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|