5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.038 Low
EPSS
Percentile
90.5%
Several vulnerabilities have been discovered in Tor, an online privacy
tool.
Additionally the update to stable includes the following fixes:
when waiting for a client to renegotiate, don’t allow it to add any
bytes to the input buffer. This fixes a potential DoS issue
[tor-5934,
tor-6007].
For the stable distribution (squeeze), these problems have been fixed in
version 0.2.2.39-1.
For the unstable distribution, these problems have been fixed in version
0.2.3.22-rc-1.
We recommend that you upgrade your tor packages.
CPE | Name | Operator | Version |
---|---|---|---|
tor | eq | 0.2.1.29-1 | |
tor | eq | 0.2.1.30-1 | |
tor | eq | 0.2.1.31-1 | |
tor | eq | 0.2.1.31-1~lenny+1 | |
tor | eq | 0.2.1.32-1 | |
tor | eq | 0.2.2.1-alpha-1 | |
tor | eq | 0.2.2.10-alpha-1 | |
tor | eq | 0.2.2.10-alpha-2 | |
tor | eq | 0.2.2.11-alpha-1 | |
tor | eq | 0.2.2.12-alpha-1 |