CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
96.7%
Integer overflow in Tor before 0.1.1.20 allows remote attackers to execute arbitrary code via crafted large inputs, which result in a buffer overflow when elements are added to smartlists.
Vendor | Product | Version | CPE |
---|---|---|---|
tor | tor | 0.0.2 | cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre13 | cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre14 | cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre15 | cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre16 | cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre17 | cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre18 | cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre19 | cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre20 | cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre21 | cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:* |