[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3216-1 tor -- tor

ID: oval:org.secpod.oval:def:602026Date: (C)2015-04-07   (M)2022-09-21
Class: PATCHFamily: unix




Several vulnerabilities have been discovered in Tor, a connection-based low-latency anonymous communication system: CVE-2015-2928 "disgleirio" discovered that a malicious client could trigger an assertion failure in a Tor instance providing a hidden service, thus rendering the service inaccessible. CVE-2015-2929 "DonnchaC" discovered that Tor clients would crash with an assertion failure upon parsing specially crafted hidden service descriptors. Introduction points would accept multiple INTRODUCE1 cells on one circuit, making it inexpensive for an attacker to overload a hidden service with introductions. Introduction points now no longer allow multiple cells of that type on the same circuit.

Platform:
Debian 7.0
Product:
tor
Reference:
DSA-3216-1
CVE-2015-2928
CVE-2015-2929
CVE    2
CVE-2015-2929
CVE-2015-2928
CPE    2
cpe:/a:tor:tor
cpe:/o:debian:debian_linux:7.x

© SecPod Technologies