Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.902332
Categoría:Buffer overflow
Título:Tor Unspecified Heap Based Buffer Overflow Vulnerability - Linux
Resumen:Tor is prone to heap based buffer overflow vulnerability.
Descripción:Summary:
Tor is prone to heap based buffer overflow vulnerability.

Vulnerability Insight:
The issue is caused by an unknown heap overflow error when processing
user-supplied data, which can be exploited to cause a heap-based buffer
overflow.

Vulnerability Impact:
Successful exploitation will allow remote attackers to execute arbitrary
code in the context of the user running the application. Failed exploit
attempts will likely result in denial-of-service conditions.

Affected Software/OS:
Tor version prior to 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha on Linux.

Solution:
Upgrade to version 0.2.1.28 or 0.2.2.20-alpha or later.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2010-1676
BugTraq ID: 45500
http://www.securityfocus.com/bid/45500
Debian Security Information: DSA-2136 (Google Search)
http://www.debian.org/security/2010/dsa-2136
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052690.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052657.html
http://security.gentoo.org/glsa/glsa-201101-02.xml
http://archives.seul.org/or/announce/Dec-2010/msg00000.html
http://securitytracker.com/id?1024910
http://secunia.com/advisories/42536
http://secunia.com/advisories/42667
http://secunia.com/advisories/42783
http://secunia.com/advisories/42916
http://www.vupen.com/english/advisories/2010/3290
http://www.vupen.com/english/advisories/2011/0114
CopyrightCopyright (C) 2011 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.