Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-2689

Опубликовано: 24 янв. 2020
Источник: debian
EPSS Низкий

Описание

Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle pending-connection resolve states during periods of high DNS load, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
torfixed0.2.5.11-1package

Примечания

  • https://bugs.torproject.org/14129

EPSS

Процентиль: 70%
0.00648
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 6 лет назад

Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle pending-connection resolve states during periods of high DNS load, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.

CVSS3: 7.5
nvd
около 6 лет назад

Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle pending-connection resolve states during periods of high DNS load, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.

github
больше 3 лет назад

Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle pending-connection resolve states during periods of high DNS load, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.

EPSS

Процентиль: 70%
0.00648
Низкий