Vulnerabilities
Vulnerable Software
Torproject:  >> Tor  >> 0.2.4.21  Security Vulnerabilities
Tor before 0.2.8.9 and 0.2.9.x before 0.2.9.4-alpha had internal functions that were entitled to expect that buf_t data had NUL termination, but the implementation of or/buffers.c did not ensure that NUL termination was present, which allows remote attackers to cause a denial of service (client, hidden service, relay, or authority crash) via crafted data.
CVSS Score
7.5
EPSS Score
0.027
Published
2017-01-04
Tor before 0.2.4.23 and 0.2.5 before 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote attackers to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a means of communicating information about hidden service names.
CVSS Score
5.8
EPSS Score
0.006
Published
2014-07-30


Contact Us

Shodan ® - All rights reserved