8.1 High
AI Score
Confidence
Low
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.158 Low
EPSS
Percentile
95.9%
Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors.
archives.seul.org/or/announce/Dec-2010/msg00000.html
blog.torproject.org/blog/tor-02128-released-security-patches
blog.torproject.org/blog/tor-02220-alpha-out-security-patches
lists.fedoraproject.org/pipermail/package-announce/2010-December/052657.html
lists.fedoraproject.org/pipermail/package-announce/2010-December/052690.html
secunia.com/advisories/42536
secunia.com/advisories/42667
secunia.com/advisories/42783
secunia.com/advisories/42916
security.gentoo.org/glsa/glsa-201101-02.xml
securitytracker.com/id?1024910
www.debian.org/security/2010/dsa-2136
www.securityfocus.com/bid/45500
www.vupen.com/english/advisories/2010/3290
www.vupen.com/english/advisories/2011/0114
gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog