Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xvc4-r5fw-47j4

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell reception rate) or bypass intended flow-control restrictions via a RELAY_COMMAND_SENDME command.

The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell reception rate) or bypass intended flow-control restrictions via a RELAY_COMMAND_SENDME command.

EPSS

Процентиль: 77%
0.01009
Низкий

Связанные уязвимости

ubuntu
около 13 лет назад

The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell reception rate) or bypass intended flow-control restrictions via a RELAY_COMMAND_SENDME command.

nvd
около 13 лет назад

The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell reception rate) or bypass intended flow-control restrictions via a RELAY_COMMAND_SENDME command.

debian
около 13 лет назад

The connection_edge_process_relay_cell function in or/relay.c in Tor b ...

EPSS

Процентиль: 77%
0.01009
Низкий