Описание
Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle pending-connection resolve states during periods of high DNS load, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 0.2.6.10-1 |
| esm-apps/xenial | not-affected | 0.2.6.10-1 |
| esm-infra-legacy/trusty | released | 0.2.4.27-1build0.14.04.1 |
| lucid | DNE | |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needed |
| trusty | released | 0.2.4.27-1build0.14.04.1 |
| trusty/esm | released | 0.2.4.27-1build0.14.04.1 |
| upstream | released | 0.2.5.11-1 |
| utopic | ignored | end of life |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle pending-connection resolve states during periods of high DNS load, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.
Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly hand ...
Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle pending-connection resolve states during periods of high DNS load, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.
EPSS
5 Medium
CVSS2
7.5 High
CVSS3