ID CVE-2006-3409
Summary Integer overflow in Tor before 0.1.1.20 allows remote attackers to execute arbitrary code via crafted large inputs, which result in a buffer overflow when elements are added to smartlists.
References
Vulnerable Configurations
  • cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 20-07-2017 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 18323
confirm http://tor.eff.org/cvs/tor/ChangeLog
gentoo GLSA-200606-04
secunia
  • 20277
  • 20514
xf tor-smartlists-bo(26795)
Last major update 20-07-2017 - 01:32
Published 07-07-2006 - 00:05
Last modified 20-07-2017 - 01:32
Back to Top