Vulnerability Details CVE-2012-5573
The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell reception rate) or bypass intended flow-control restrictions via a RELAY_COMMAND_SENDME command.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.025
EPSS Ranking 84.7%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2012-5573
-
cpe:2.3:a:torproject:tor:0.0.2
-
cpe:2.3:a:torproject:tor:0.0.3
-
cpe:2.3:a:torproject:tor:0.0.4
-
cpe:2.3:a:torproject:tor:0.0.5
-
cpe:2.3:a:torproject:tor:0.0.6
-
cpe:2.3:a:torproject:tor:0.0.6.1
-
cpe:2.3:a:torproject:tor:0.0.6.2
-
cpe:2.3:a:torproject:tor:0.0.7
-
cpe:2.3:a:torproject:tor:0.0.7.1
-
cpe:2.3:a:torproject:tor:0.0.7.2
-
cpe:2.3:a:torproject:tor:0.0.7.3
-
cpe:2.3:a:torproject:tor:0.0.8.1
-
cpe:2.3:a:torproject:tor:0.0.9.1
-
cpe:2.3:a:torproject:tor:0.0.9.10
-
cpe:2.3:a:torproject:tor:0.0.9.2
-
cpe:2.3:a:torproject:tor:0.0.9.3
-
cpe:2.3:a:torproject:tor:0.0.9.4
-
cpe:2.3:a:torproject:tor:0.0.9.5
-
cpe:2.3:a:torproject:tor:0.0.9.6
-
cpe:2.3:a:torproject:tor:0.0.9.7
-
cpe:2.3:a:torproject:tor:0.0.9.8
-
cpe:2.3:a:torproject:tor:0.0.9.9
-
cpe:2.3:a:torproject:tor:0.1.0.10
-
cpe:2.3:a:torproject:tor:0.1.0.11
-
cpe:2.3:a:torproject:tor:0.1.0.12
-
cpe:2.3:a:torproject:tor:0.1.0.13
-
cpe:2.3:a:torproject:tor:0.1.0.14
-
cpe:2.3:a:torproject:tor:0.1.0.15
-
cpe:2.3:a:torproject:tor:0.1.0.16
-
cpe:2.3:a:torproject:tor:0.1.0.17
-
cpe:2.3:a:torproject:tor:0.1.1.20
-
cpe:2.3:a:torproject:tor:0.1.1.21
-
cpe:2.3:a:torproject:tor:0.1.1.22
-
cpe:2.3:a:torproject:tor:0.1.1.23
-
cpe:2.3:a:torproject:tor:0.1.1.24
-
cpe:2.3:a:torproject:tor:0.1.1.25
-
cpe:2.3:a:torproject:tor:0.1.1.26
-
cpe:2.3:a:torproject:tor:0.1.2.13
-
cpe:2.3:a:torproject:tor:0.1.2.14
-
cpe:2.3:a:torproject:tor:0.1.2.15
-
cpe:2.3:a:torproject:tor:0.1.2.16
-
cpe:2.3:a:torproject:tor:0.1.2.17
-
cpe:2.3:a:torproject:tor:0.1.2.18
-
cpe:2.3:a:torproject:tor:0.1.2.19
-
cpe:2.3:a:torproject:tor:0.2.0.30
-
cpe:2.3:a:torproject:tor:0.2.0.31
-
cpe:2.3:a:torproject:tor:0.2.0.32
-
cpe:2.3:a:torproject:tor:0.2.0.33
-
cpe:2.3:a:torproject:tor:0.2.0.34
-
cpe:2.3:a:torproject:tor:0.2.0.35
-
cpe:2.3:a:torproject:tor:0.2.2.18
-
cpe:2.3:a:torproject:tor:0.2.2.19
-
cpe:2.3:a:torproject:tor:0.2.2.20
-
cpe:2.3:a:torproject:tor:0.2.2.21
-
cpe:2.3:a:torproject:tor:0.2.2.22
-
cpe:2.3:a:torproject:tor:0.2.2.23
-
cpe:2.3:a:torproject:tor:0.2.2.24
-
cpe:2.3:a:torproject:tor:0.2.2.25
-
cpe:2.3:a:torproject:tor:0.2.2.26
-
cpe:2.3:a:torproject:tor:0.2.2.27
-
cpe:2.3:a:torproject:tor:0.2.2.28
-
cpe:2.3:a:torproject:tor:0.2.2.29
-
cpe:2.3:a:torproject:tor:0.2.2.30
-
cpe:2.3:a:torproject:tor:0.2.2.31
-
cpe:2.3:a:torproject:tor:0.2.2.32
-
cpe:2.3:a:torproject:tor:0.2.2.33
-
cpe:2.3:a:torproject:tor:0.2.2.34
-
cpe:2.3:a:torproject:tor:0.2.2.35
-
cpe:2.3:a:torproject:tor:0.2.2.36
-
cpe:2.3:a:torproject:tor:0.2.2.37
-
cpe:2.3:a:torproject:tor:0.2.2.38
-
cpe:2.3:a:torproject:tor:0.2.3
-
cpe:2.3:a:torproject:tor:0.2.3.13
-
cpe:2.3:a:torproject:tor:0.2.3.14
-
cpe:2.3:a:torproject:tor:0.2.3.15
-
cpe:2.3:a:torproject:tor:0.2.3.16
-
cpe:2.3:a:torproject:tor:0.2.3.17
-
cpe:2.3:a:torproject:tor:0.2.3.18
-
cpe:2.3:a:torproject:tor:0.2.3.19
-
cpe:2.3:a:torproject:tor:0.2.3.20
-
cpe:2.3:a:torproject:tor:0.2.3.21
-
cpe:2.3:a:torproject:tor:0.2.3.22
-
cpe:2.3:a:torproject:tor:0.2.3.23
-
cpe:2.3:a:torproject:tor:0.2.3.24