Tor before 0.2.8.12 might allow remote attackers to cause a denial of service (client crash) via a crafted hidden service descriptor.
References
Link | Resource |
---|---|
https://www.debian.org/security/2016/dsa-3741 | Third Party Advisory |
https://trac.torproject.org/projects/tor/ticket/21018 | Issue Tracking Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTU2R253477RZLYAJAR5DAXAON7KIVLA/ | Issue Tracking |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXOJSMCTIOHLBRYFBVEL3CDLGPZXX6WE/ | Third Party Advisory |
https://gitweb.torproject.org/tor.git/commit/?id=d978216dea6b21ac38230a59d172139185a68dbd | Patch Vendor Advisory |
https://blog.torproject.org/blog/tor-02812-released | Vendor Advisory |
http://lists.opensuse.org/opensuse-updates/2016-12/msg00155.html | Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2016-12/msg00154.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2017-12-05 08:29
Updated : 2018-10-30 09:27
NVD link : CVE-2016-1254
Mitre link : CVE-2016-1254
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
fedoraproject
- fedora
torproject
- tor
opensuse_project
- leap
opensuse
- leap
- opensuse
debian
- debian_linux