Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-5573

Опубликовано: 01 янв. 2013
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5

Описание

The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell reception rate) or bypass intended flow-control restrictions via a RELAY_COMMAND_SENDME command.

РелизСтатусПримечание
devel

not-affected

0.2.3.25-1
esm-apps/xenial

not-affected

0.2.3.25-1
esm-infra-legacy/trusty

not-affected

0.2.3.25-1
hardy

ignored

end of life
lucid

DNE

oneiric

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

ignored

end of life
raring

not-affected

0.2.3.25-1

Показывать по

EPSS

Процентиль: 77%
0.01009
Низкий

5 Medium

CVSS2

Связанные уязвимости

nvd
около 13 лет назад

The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell reception rate) or bypass intended flow-control restrictions via a RELAY_COMMAND_SENDME command.

debian
около 13 лет назад

The connection_edge_process_relay_cell function in or/relay.c in Tor b ...

github
больше 3 лет назад

The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell reception rate) or bypass intended flow-control restrictions via a RELAY_COMMAND_SENDME command.

EPSS

Процентиль: 77%
0.01009
Низкий

5 Medium

CVSS2