Описание
The Hidden Service (HS) client implementation in Tor before 0.2.4.27, 0.2.5.x before 0.2.5.12, and 0.2.6.x before 0.2.6.7 allows remote servers to cause a denial of service (assertion failure and application exit) via a malformed HS descriptor.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 0.2.6.10-1 |
| esm-apps/xenial | not-affected | 0.2.6.10-1 |
| esm-infra-legacy/trusty | released | 0.2.4.27-1build0.14.04.1 |
| lucid | DNE | |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needed |
| trusty | released | 0.2.4.27-1build0.14.04.1 |
| trusty/esm | released | 0.2.4.27-1build0.14.04.1 |
| upstream | released | 0.2.5.12-1 |
| utopic | ignored | end of life |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
The Hidden Service (HS) client implementation in Tor before 0.2.4.27, 0.2.5.x before 0.2.5.12, and 0.2.6.x before 0.2.6.7 allows remote servers to cause a denial of service (assertion failure and application exit) via a malformed HS descriptor.
The Hidden Service (HS) client implementation in Tor before 0.2.4.27, ...
The Hidden Service (HS) client implementation in Tor before 0.2.4.27, 0.2.5.x before 0.2.5.12, and 0.2.6.x before 0.2.6.7 allows remote servers to cause a denial of service (assertion failure and application exit) via a malformed HS descriptor.
EPSS
5 Medium
CVSS2
7.5 High
CVSS3