CVE-2017-8823
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, there is a use-after-free in onion service v2 during intro-point expiration because the expiring list is mismanaged in certain error cases, aka TROVE-2017-013.
En Tor, en versiones anteriores a la 0.2.5.16; de la versión 0.2.6 hasta la 0.2.8 anterior a la 0.2.8.17: versiones 0.2.9 anteriores a la 0.2.9.14; versiones 0.3.0 anteriores a la 0.3.0.13 y versiones 0.3.1 anteriores a la 0.3.1.9, existe un uso de memoria previamente liberada en el servicio onion v2 durante la expiración del nodo de entrada, debido a que la lista de expiración se gestiona de manera incorrecta en ciertos casos de error. Esto también se conoce como TROVE-2017-013.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-05-07 CVE Reserved
- 2017-12-03 CVE Published
- 2023-06-29 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-416: Use After Free
CAPEC
References (4)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516 | 2017-12-21 | |
https://bugs.torproject.org/24313 | 2017-12-21 | |
https://bugs.torproject.org/24430 | 2017-12-21 | |
https://www.debian.org/security/2017/dsa-4054 | 2017-12-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tor Project Search vendor "Tor Project" | Tor Search vendor "Tor Project" for product "Tor" | < 0.2.5.16 Search vendor "Tor Project" for product "Tor" and version " < 0.2.5.16" | - |
Affected
| ||||||
Tor Project Search vendor "Tor Project" | Tor Search vendor "Tor Project" for product "Tor" | >= 0.2.6 < 0.2.8.17 Search vendor "Tor Project" for product "Tor" and version " >= 0.2.6 < 0.2.8.17" | - |
Affected
| ||||||
Tor Project Search vendor "Tor Project" | Tor Search vendor "Tor Project" for product "Tor" | >= 0.2.9 < 0.2.9.14 Search vendor "Tor Project" for product "Tor" and version " >= 0.2.9 < 0.2.9.14" | - |
Affected
| ||||||
Tor Project Search vendor "Tor Project" | Tor Search vendor "Tor Project" for product "Tor" | >= 0.3.0 < 0.3.0.13 Search vendor "Tor Project" for product "Tor" and version " >= 0.3.0 < 0.3.0.13" | - |
Affected
| ||||||
Tor Project Search vendor "Tor Project" | Tor Search vendor "Tor Project" for product "Tor" | >= 0.3.1 < 0.3.1.9 Search vendor "Tor Project" for product "Tor" and version " >= 0.3.1 < 0.3.1.9" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|