Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-63gv-rq26-r5mp

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration.

Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration.

EPSS

Процентиль: 87%
0.03506
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
около 14 лет назад

Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration.

nvd
около 14 лет назад

Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration.

debian
около 14 лет назад

Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remo ...

EPSS

Процентиль: 87%
0.03506
Низкий

Дефекты

CWE-119