![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.902332 |
Categoría: | Buffer overflow |
Título: | Tor Unspecified Heap Based Buffer Overflow Vulnerability - Linux |
Resumen: | Tor is prone to heap based buffer overflow vulnerability. |
Descripción: | Summary: Tor is prone to heap based buffer overflow vulnerability. Vulnerability Insight: The issue is caused by an unknown heap overflow error when processing user-supplied data, which can be exploited to cause a heap-based buffer overflow. Vulnerability Impact: Successful exploitation will allow remote attackers to execute arbitrary code in the context of the user running the application. Failed exploit attempts will likely result in denial-of-service conditions. Affected Software/OS: Tor version prior to 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha on Linux. Solution: Upgrade to version 0.2.1.28 or 0.2.2.20-alpha or later. CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2010-1676 BugTraq ID: 45500 http://www.securityfocus.com/bid/45500 Debian Security Information: DSA-2136 (Google Search) http://www.debian.org/security/2010/dsa-2136 http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052690.html http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052657.html http://security.gentoo.org/glsa/glsa-201101-02.xml http://archives.seul.org/or/announce/Dec-2010/msg00000.html http://securitytracker.com/id?1024910 http://secunia.com/advisories/42536 http://secunia.com/advisories/42667 http://secunia.com/advisories/42783 http://secunia.com/advisories/42916 http://www.vupen.com/english/advisories/2010/3290 http://www.vupen.com/english/advisories/2011/0114 |
Copyright | Copyright (C) 2011 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |