Tor before 0.2.8.12 might allow remote attackers to cause a denial of service (client crash) via a crafted hidden service descriptor.
References
| Link | Resource |
|---|---|
| https://www.debian.org/security/2016/dsa-3741 | Third Party Advisory |
| https://trac.torproject.org/projects/tor/ticket/21018 | Issue Tracking Vendor Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTU2R253477RZLYAJAR5DAXAON7KIVLA/ | Issue Tracking |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXOJSMCTIOHLBRYFBVEL3CDLGPZXX6WE/ | Third Party Advisory |
| https://gitweb.torproject.org/tor.git/commit/?id=d978216dea6b21ac38230a59d172139185a68dbd | Patch Vendor Advisory |
| https://blog.torproject.org/blog/tor-02812-released | Vendor Advisory |
| http://lists.opensuse.org/opensuse-updates/2016-12/msg00155.html | Third Party Advisory |
| http://lists.opensuse.org/opensuse-updates/2016-12/msg00154.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2017-12-05 16:29
Updated : 2018-10-30 16:27
NVD link : CVE-2016-1254
Mitre link : CVE-2016-1254
JSON object : View
Products Affected
opensuse
- leap
- opensuse
fedoraproject
- fedora
debian
- debian_linux
opensuse_project
- leap
torproject
- tor
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
