Lucene search

K
osvGoogleOSV:DSA-2548-1
HistorySep 13, 2012 - 12:00 a.m.

tor - several

2012-09-1300:00:00
Google
osv.dev
11

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.038 Low

EPSS

Percentile

90.5%

Several vulnerabilities have been discovered in Tor, an online privacy
tool.

  • CVE-2012-3518
    Avoid an uninitialised memory read when reading a vote or consensus
    document that has an unrecognized flavour name. This could lead to
    a remote crash, resulting in denial of service.
  • CVE-2012-3519
    Try to leak less information about what relays a client is choosing to
    a side-channel attacker.
  • CVE-2012-4419
    By providing specially crafted date strings to a victim tor instance,
    an attacker can cause it to run into an assertion and shut down.

Additionally the update to stable includes the following fixes:
when waiting for a client to renegotiate, don’t allow it to add any
bytes to the input buffer. This fixes a potential DoS issue
[tor-5934,
tor-6007].

For the stable distribution (squeeze), these problems have been fixed in
version 0.2.2.39-1.

For the unstable distribution, these problems have been fixed in version
0.2.3.22-rc-1.

We recommend that you upgrade your tor packages.

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.038 Low

EPSS

Percentile

90.5%