An issue was discovered in Tor before 0.2.9.15, 0.3.1.x before 0.3.1.10, and 0.3.2.x before 0.3.2.10. The directory-authority protocol-list subprotocol implementation allows remote attackers to cause a denial of service (NULL pointer dereference and directory-authority crash) via a misformatted relay descriptor that is mishandled during voting.
References
Link | Resource |
---|---|
https://trac.torproject.org/projects/tor/ticket/25074 | Vendor Advisory |
https://blog.torproject.org/new-stable-tor-releases-security-fixes-and-dos-prevention-03210-03110-02915 | Vendor Advisory |
https://www.debian.org/security/2018/dsa-4183 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2018-03-05 07:29
Updated : 2019-04-30 07:58
NVD link : CVE-2018-0490
Mitre link : CVE-2018-0490
JSON object : View
CWE
CWE-476
NULL Pointer Dereference
Products Affected
debian
- debian_linux
torproject
- tor