Lucene search

K
TorprojectTor0.2.2.23

6 matches found

CVE
CVE
added 2014/07/30 4:55 p.m.68 views

CVE-2014-5117

Tor before 0.2.4.23 and 0.2.5 before 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote attackers to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a means of communicating inform...

5.8CVSS7.2AI score0.006EPSS
CVE
CVE
added 2012/09/14 6:55 p.m.55 views

CVE-2012-4419

The compare_tor_addr_to_addr_policy function in or/policies.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.21-rc, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a zero-valued port field that is not properly handled during policy comparison.

5CVSS6.3AI score0.01621EPSS
CVE
CVE
added 2013/01/01 12:35 p.m.54 views

CVE-2012-5573

The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell reception rate) or bypass intended flow-control re...

5CVSS6.4AI score0.02484EPSS
CVE
CVE
added 2012/09/14 6:55 p.m.53 views

CVE-2012-4922

The tor_timegm function in common/util.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.22-rc, does not properly validate time values, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed directory object, a different vulnerability than CV...

5CVSS8.8AI score0.05586EPSS
CVE
CVE
added 2014/02/03 3:55 a.m.51 views

CVE-2012-2249

Tor before 0.2.3.23-rc allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a renegotiation attempt that occurs after the initiation of the V3 link protocol.

5CVSS6.7AI score0.00474EPSS
CVE
CVE
added 2014/02/03 3:55 a.m.48 views

CVE-2012-2250

Tor before 0.2.3.24-rc allows remote attackers to cause a denial of service (assertion failure and daemon exit) by performing link protocol negotiation incorrectly.

5CVSS6.7AI score0.00474EPSS