[Forgot Password]
Login  Register Subscribe

24003

 
 

131425

 
 

104705

 
 

909

 
 

84119

 
 

133

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2010-1676Date: (C)2010-12-21   (M)2018-03-27


Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : CVSS Score : 10.0
Exploit Score: Exploit Score: 10.0
Impact Score: Impact Score: 10.0
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: NETWORK
Attack Complexity: Access Complexity: LOW
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: COMPLETE
Scope: Integrity: COMPLETE
Confidentiality: Availability: COMPLETE
Integrity:  
Availability:  
  
Reference:
SECTRACK-1024910
SECUNIA-42536
SECUNIA-42667
SECUNIA-42783
SECUNIA-42916
BID-45500
ADV-2010-3290
ADV-2011-0114
DSA-2136
FEDORA-2010-19147
FEDORA-2010-19159
GLSA-201101-02
http://archives.seul.org/or/announce/Dec-2010/msg00000.html
http://blog.torproject.org/blog/tor-02128-released-security-patches
http://blog.torproject.org/blog/tor-02220-alpha-out-security-patches
https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog

CWE    1
CWE-119
OVAL    2
oval:org.secpod.oval:def:100498
oval:org.secpod.oval:def:101049

© 2013 SecPod Technologies