Описание
The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell reception rate) or bypass intended flow-control restrictions via a RELAY_COMMAND_SENDME command.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 0.2.3.25-1 |
| esm-apps/xenial | not-affected | 0.2.3.25-1 |
| esm-infra-legacy/trusty | not-affected | 0.2.3.25-1 |
| hardy | ignored | end of life |
| lucid | DNE | |
| oneiric | ignored | end of life |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needed |
| quantal | ignored | end of life |
| raring | not-affected | 0.2.3.25-1 |
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell reception rate) or bypass intended flow-control restrictions via a RELAY_COMMAND_SENDME command.
The connection_edge_process_relay_cell function in or/relay.c in Tor b ...
The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell reception rate) or bypass intended flow-control restrictions via a RELAY_COMMAND_SENDME command.
EPSS
5 Medium
CVSS2