Max CVSS | 5.0 | Min CVSS | 5.0 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2012-5573 | 5.0 |
The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell r
|
29-08-2017 - 01:32 | 01-01-2013 - 12:35 | |
CVE-2012-4922 | 5.0 |
The tor_timegm function in common/util.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.22-rc, does not properly validate time values, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed di
|
22-08-2013 - 03:59 | 14-09-2012 - 18:55 | |
CVE-2012-4419 | 5.0 |
The compare_tor_addr_to_addr_policy function in or/policies.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.21-rc, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a zero-valued port field that is not pr
|
22-08-2013 - 03:58 | 14-09-2012 - 18:55 | |
CVE-2012-3519 | 5.0 |
routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack
|
22-08-2013 - 03:56 | 26-08-2012 - 03:17 | |
CVE-2012-3518 | 5.0 |
The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted
|
22-08-2013 - 03:56 | 26-08-2012 - 03:17 | |
CVE-2012-3517 | 5.0 |
Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests.
|
22-08-2013 - 03:56 | 26-08-2012 - 03:17 |