![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.72177 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-2548-1) |
Summary: | The remote host is missing an update for the Debian 'tor' package(s) announced via the DSA-2548-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'tor' package(s) announced via the DSA-2548-1 advisory. Vulnerability Insight: Several vulnerabilities have been discovered in Tor, an online privacy tool. CVE-2012-3518 Avoid an uninitialised memory read when reading a vote or consensus document that has an unrecognized flavour name. This could lead to a remote crash, resulting in denial of service. CVE-2012-3519 Try to leak less information about what relays a client is choosing to a side-channel attacker. CVE-2012-4419 By providing specially crafted date strings to a victim tor instance, an attacker can cause it to run into an assertion and shut down. Additionally the update to stable includes the following fixes: when waiting for a client to renegotiate, don't allow it to add any bytes to the input buffer. This fixes a potential DoS issue [tor-5934, tor-6007]. For the stable distribution (squeeze), these problems have been fixed in version 0.2.2.39-1. For the unstable distribution, these problems have been fixed in version 0.2.3.22-rc-1. We recommend that you upgrade your tor packages. Affected Software/OS: 'tor' package(s) on Debian 6. Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-3518 http://security.gentoo.org/glsa/glsa-201301-03.xml http://openwall.com/lists/oss-security/2012/08/21/6 https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html http://secunia.com/advisories/50583 SuSE Security Announcement: openSUSE-SU-2012:1068 (Google Search) http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html Common Vulnerability Exposure (CVE) ID: CVE-2012-3519 Common Vulnerability Exposure (CVE) ID: CVE-2012-4419 http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html http://openwall.com/lists/oss-security/2012/09/13/2 https://lists.torproject.org/pipermail/tor-talk/2012-September/025434.html SuSE Security Announcement: openSUSE-SU-2012:1278 (Google Search) http://lists.opensuse.org/opensuse-updates/2012-10/msg00005.html Common Vulnerability Exposure (CVE) ID: CVE-2012-4922 http://openwall.com/lists/oss-security/2012/09/12/5 https://lists.torproject.org/pipermail/tor-talk/2012-September/025501.html |
Copyright | Copyright (C) 2012 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |