ID CVE-2012-3517
Summary Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests.
References
Vulnerable Configurations
  • cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 22-08-2013 - 03:56)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
confirm
fedora FEDORA-2012-14638
gentoo GLSA-201301-03
mlist
  • [oss-security] 20120821 Re: CVE Request -- Tor 0.2.2.38: Three issues
  • [tor-announce] 20120819 Tor 0.2.2.38 is released
suse openSUSE-SU-2012:1068
Last major update 22-08-2013 - 03:56
Published 26-08-2012 - 03:17
Last modified 22-08-2013 - 03:56
Back to Top