Vulnerability Details CVE-2011-0427
Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.049
EPSS Ranking 89.0%
CVSS Severity
CVSS v2 Score 6.8
Products affected by CVE-2011-0427
-
-
-
Tor
»
Tor
»
Version: 0.0.2_pre13
cpe:2.3:a:tor:tor:0.0.2_pre13
-
Tor
»
Tor
»
Version: 0.0.2_pre14
cpe:2.3:a:tor:tor:0.0.2_pre14
-
Tor
»
Tor
»
Version: 0.0.2_pre15
cpe:2.3:a:tor:tor:0.0.2_pre15
-
Tor
»
Tor
»
Version: 0.0.2_pre16
cpe:2.3:a:tor:tor:0.0.2_pre16
-
Tor
»
Tor
»
Version: 0.0.2_pre17
cpe:2.3:a:tor:tor:0.0.2_pre17
-
Tor
»
Tor
»
Version: 0.0.2_pre18
cpe:2.3:a:tor:tor:0.0.2_pre18
-
Tor
»
Tor
»
Version: 0.0.2_pre19
cpe:2.3:a:tor:tor:0.0.2_pre19
-
Tor
»
Tor
»
Version: 0.0.2_pre20
cpe:2.3:a:tor:tor:0.0.2_pre20
-
Tor
»
Tor
»
Version: 0.0.2_pre21
cpe:2.3:a:tor:tor:0.0.2_pre21
-
Tor
»
Tor
»
Version: 0.0.2_pre22
cpe:2.3:a:tor:tor:0.0.2_pre22
-
Tor
»
Tor
»
Version: 0.0.2_pre23
cpe:2.3:a:tor:tor:0.0.2_pre23
-
Tor
»
Tor
»
Version: 0.0.2_pre24
cpe:2.3:a:tor:tor:0.0.2_pre24
-
Tor
»
Tor
»
Version: 0.0.2_pre25
cpe:2.3:a:tor:tor:0.0.2_pre25
-
Tor
»
Tor
»
Version: 0.0.2_pre26
cpe:2.3:a:tor:tor:0.0.2_pre26
-
Tor
»
Tor
»
Version: 0.0.2_pre27
cpe:2.3:a:tor:tor:0.0.2_pre27
-
-
-
-
-
cpe:2.3:a:tor:tor:0.0.6.1
-
cpe:2.3:a:tor:tor:0.0.6.2
-
-
cpe:2.3:a:tor:tor:0.0.7.1
-
cpe:2.3:a:tor:tor:0.0.7.2
-
cpe:2.3:a:tor:tor:0.0.7.3
-
-
cpe:2.3:a:tor:tor:0.0.8.1
-
-
cpe:2.3:a:tor:tor:0.0.9.1
-
cpe:2.3:a:tor:tor:0.0.9.10
-
cpe:2.3:a:tor:tor:0.0.9.2
-
cpe:2.3:a:tor:tor:0.0.9.3
-
cpe:2.3:a:tor:tor:0.0.9.4
-
cpe:2.3:a:tor:tor:0.0.9.5
-
cpe:2.3:a:tor:tor:0.0.9.6
-
cpe:2.3:a:tor:tor:0.0.9.7
-
cpe:2.3:a:tor:tor:0.0.9.8
-
cpe:2.3:a:tor:tor:0.0.9.9
-
cpe:2.3:a:tor:tor:0.1.0.1
-
cpe:2.3:a:tor:tor:0.1.0.10
-
cpe:2.3:a:tor:tor:0.1.0.11
-
cpe:2.3:a:tor:tor:0.1.0.12
-
cpe:2.3:a:tor:tor:0.1.0.13
-
cpe:2.3:a:tor:tor:0.1.0.14
-
cpe:2.3:a:tor:tor:0.1.0.15
-
cpe:2.3:a:tor:tor:0.1.0.16
-
cpe:2.3:a:tor:tor:0.1.0.17
-
cpe:2.3:a:tor:tor:0.1.0.2
-
cpe:2.3:a:tor:tor:0.1.0.3
-
cpe:2.3:a:tor:tor:0.1.0.4
-
cpe:2.3:a:tor:tor:0.1.0.5
-
cpe:2.3:a:tor:tor:0.1.0.6
-
cpe:2.3:a:tor:tor:0.1.0.7
-
cpe:2.3:a:tor:tor:0.1.0.8
-
cpe:2.3:a:tor:tor:0.1.0.9
-
-
cpe:2.3:a:tor:tor:0.1.1.1
-
cpe:2.3:a:tor:tor:0.1.1.10
-
cpe:2.3:a:tor:tor:0.1.1.11
-
cpe:2.3:a:tor:tor:0.1.1.12
-
cpe:2.3:a:tor:tor:0.1.1.13
-
cpe:2.3:a:tor:tor:0.1.1.14
-
cpe:2.3:a:tor:tor:0.1.1.15
-
cpe:2.3:a:tor:tor:0.1.1.16
-
cpe:2.3:a:tor:tor:0.1.1.17
-
cpe:2.3:a:tor:tor:0.1.1.18
-
cpe:2.3:a:tor:tor:0.1.1.19
-
cpe:2.3:a:tor:tor:0.1.1.2
-
cpe:2.3:a:tor:tor:0.1.1.20
-
cpe:2.3:a:tor:tor:0.1.1.21
-
cpe:2.3:a:tor:tor:0.1.1.22
-
cpe:2.3:a:tor:tor:0.1.1.23
-
cpe:2.3:a:tor:tor:0.1.1.25
-
cpe:2.3:a:tor:tor:0.1.1.26
-
cpe:2.3:a:tor:tor:0.1.1.3
-
cpe:2.3:a:tor:tor:0.1.1.4
-
cpe:2.3:a:tor:tor:0.1.1.5
-
cpe:2.3:a:tor:tor:0.1.1.6
-
cpe:2.3:a:tor:tor:0.1.1.7
-
cpe:2.3:a:tor:tor:0.1.1.8
-
cpe:2.3:a:tor:tor:0.1.1.9
-
cpe:2.3:a:tor:tor:0.1.2.1
-
cpe:2.3:a:tor:tor:0.1.2.10
-
cpe:2.3:a:tor:tor:0.1.2.11
-
cpe:2.3:a:tor:tor:0.1.2.12
-
cpe:2.3:a:tor:tor:0.1.2.13
-
cpe:2.3:a:tor:tor:0.1.2.14
-
cpe:2.3:a:tor:tor:0.1.2.15
-
cpe:2.3:a:tor:tor:0.1.2.16
-
cpe:2.3:a:tor:tor:0.1.2.17
-
cpe:2.3:a:tor:tor:0.1.2.18
-
cpe:2.3:a:tor:tor:0.1.2.19
-
cpe:2.3:a:tor:tor:0.1.2.2
-
cpe:2.3:a:tor:tor:0.1.2.3
-
cpe:2.3:a:tor:tor:0.1.2.30
-
cpe:2.3:a:tor:tor:0.1.2.31
-
cpe:2.3:a:tor:tor:0.1.2.4
-
cpe:2.3:a:tor:tor:0.1.2.5
-
cpe:2.3:a:tor:tor:0.1.2.6
-
cpe:2.3:a:tor:tor:0.1.2.7
-
cpe:2.3:a:tor:tor:0.1.2.8
-
cpe:2.3:a:tor:tor:0.1.2.9
-
cpe:2.3:a:tor:tor:0.2.0.1
-
cpe:2.3:a:tor:tor:0.2.0.10
-
cpe:2.3:a:tor:tor:0.2.0.11
-
cpe:2.3:a:tor:tor:0.2.0.12
-
cpe:2.3:a:tor:tor:0.2.0.13
-
cpe:2.3:a:tor:tor:0.2.0.14
-
cpe:2.3:a:tor:tor:0.2.0.15
-
cpe:2.3:a:tor:tor:0.2.0.16
-
cpe:2.3:a:tor:tor:0.2.0.17
-
cpe:2.3:a:tor:tor:0.2.0.18
-
cpe:2.3:a:tor:tor:0.2.0.19
-
cpe:2.3:a:tor:tor:0.2.0.2
-
cpe:2.3:a:tor:tor:0.2.0.20
-
cpe:2.3:a:tor:tor:0.2.0.21
-
cpe:2.3:a:tor:tor:0.2.0.22
-
cpe:2.3:a:tor:tor:0.2.0.23
-
cpe:2.3:a:tor:tor:0.2.0.24
-
cpe:2.3:a:tor:tor:0.2.0.25
-
cpe:2.3:a:tor:tor:0.2.0.26
-
cpe:2.3:a:tor:tor:0.2.0.27
-
cpe:2.3:a:tor:tor:0.2.0.28
-
cpe:2.3:a:tor:tor:0.2.0.29
-
cpe:2.3:a:tor:tor:0.2.0.3
-
cpe:2.3:a:tor:tor:0.2.0.30
-
cpe:2.3:a:tor:tor:0.2.0.31
-
cpe:2.3:a:tor:tor:0.2.0.32
-
cpe:2.3:a:tor:tor:0.2.0.33
-
cpe:2.3:a:tor:tor:0.2.0.34
-
cpe:2.3:a:tor:tor:0.2.0.35
-
cpe:2.3:a:tor:tor:0.2.0.4
-
cpe:2.3:a:tor:tor:0.2.0.5
-
cpe:2.3:a:tor:tor:0.2.0.6
-
cpe:2.3:a:tor:tor:0.2.0.7
-
cpe:2.3:a:tor:tor:0.2.0.8
-
cpe:2.3:a:tor:tor:0.2.0.9
-
cpe:2.3:a:tor:tor:0.2.1.1
-
cpe:2.3:a:tor:tor:0.2.1.10
-
cpe:2.3:a:tor:tor:0.2.1.11
-
cpe:2.3:a:tor:tor:0.2.1.12
-
cpe:2.3:a:tor:tor:0.2.1.13
-
cpe:2.3:a:tor:tor:0.2.1.14
-
cpe:2.3:a:tor:tor:0.2.1.15
-
cpe:2.3:a:tor:tor:0.2.1.16
-
cpe:2.3:a:tor:tor:0.2.1.17
-
cpe:2.3:a:tor:tor:0.2.1.18
-
cpe:2.3:a:tor:tor:0.2.1.19
-
cpe:2.3:a:tor:tor:0.2.1.2
-
cpe:2.3:a:tor:tor:0.2.1.20
-
cpe:2.3:a:tor:tor:0.2.1.21
-
cpe:2.3:a:tor:tor:0.2.1.22
-
cpe:2.3:a:tor:tor:0.2.1.23
-
cpe:2.3:a:tor:tor:0.2.1.24
-
cpe:2.3:a:tor:tor:0.2.1.25
-
cpe:2.3:a:tor:tor:0.2.1.26
-
cpe:2.3:a:tor:tor:0.2.1.27
-
cpe:2.3:a:tor:tor:0.2.1.3
-
cpe:2.3:a:tor:tor:0.2.1.4
-
cpe:2.3:a:tor:tor:0.2.1.5
-
cpe:2.3:a:tor:tor:0.2.1.6
-
cpe:2.3:a:tor:tor:0.2.1.7
-
cpe:2.3:a:tor:tor:0.2.1.8
-
cpe:2.3:a:tor:tor:0.2.1.9
-
cpe:2.3:a:tor:tor:0.2.2.1
-
cpe:2.3:a:tor:tor:0.2.2.10
-
cpe:2.3:a:tor:tor:0.2.2.11
-
cpe:2.3:a:tor:tor:0.2.2.12
-
cpe:2.3:a:tor:tor:0.2.2.13
-
cpe:2.3:a:tor:tor:0.2.2.14
-
cpe:2.3:a:tor:tor:0.2.2.15
-
cpe:2.3:a:tor:tor:0.2.2.16
-
cpe:2.3:a:tor:tor:0.2.2.17
-
cpe:2.3:a:tor:tor:0.2.2.18
-
cpe:2.3:a:tor:tor:0.2.2.19
-
cpe:2.3:a:tor:tor:0.2.2.2
-
cpe:2.3:a:tor:tor:0.2.2.20
-
cpe:2.3:a:tor:tor:0.2.2.3
-
cpe:2.3:a:tor:tor:0.2.2.4
-
cpe:2.3:a:tor:tor:0.2.2.5
-
cpe:2.3:a:tor:tor:0.2.2.6
-
cpe:2.3:a:tor:tor:0.2.2.7
-
cpe:2.3:a:tor:tor:0.2.2.8
-
cpe:2.3:a:tor:tor:0.2.2.9