Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-0491

Опубликовано: 05 мар. 2018
Источник: debian
EPSS Низкий

Описание

A use-after-free issue was discovered in Tor 0.3.2.x before 0.3.2.10. It allows remote attackers to cause a denial of service (relay crash) because the KIST implementation allows a channel to be added more than once in the pending list.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
torfixed0.3.2.10-1package
tornot-affectedstretchpackage
tornot-affectedjessiepackage
tornot-affectedwheezypackage

Примечания

  • https://trac.torproject.org/projects/tor/ticket/25117

  • https://trac.torproject.org/projects/tor/ticket/24700

  • https://blog.torproject.org/new-stable-tor-releases-security-fixes-and-dos-prevention-03210-03110-02915

  • https://gitweb.torproject.org/tor.git/commit/?id=adaf3e9b89f62d68ab631b8f672d9bff996689b9

EPSS

Процентиль: 92%
0.08038
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 8 лет назад

A use-after-free issue was discovered in Tor 0.3.2.x before 0.3.2.10. It allows remote attackers to cause a denial of service (relay crash) because the KIST implementation allows a channel to be added more than once in the pending list.

CVSS3: 7.5
nvd
почти 8 лет назад

A use-after-free issue was discovered in Tor 0.3.2.x before 0.3.2.10. It allows remote attackers to cause a denial of service (relay crash) because the KIST implementation allows a channel to be added more than once in the pending list.

CVSS3: 7.5
github
больше 3 лет назад

A use-after-free issue was discovered in Tor 0.3.2.x before 0.3.2.10. It allows remote attackers to cause a denial of service (relay crash) because the KIST implementation allows a channel to be added more than once in the pending list.

EPSS

Процентиль: 92%
0.08038
Низкий