Описание
The hidden-service feature in Tor before 0.3.0.8 allows a denial of service (assertion failure and daemon exit) in the connection_edge_process_relay_cell function via a BEGIN_DIR cell on a rendezvous circuit.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 0.3.0.8-1 |
| cosmic | not-affected | 0.3.0.8-1 |
| devel | not-affected | 0.3.0.8-1 |
| esm-apps/bionic | not-affected | 0.3.0.8-1 |
| esm-apps/xenial | not-affected | 0.2.9.11-1~deb9u1 |
| esm-infra-legacy/trusty | released | 0.2.4.27-1ubuntu0.1 |
| precise/esm | DNE | |
| trusty | released | 0.2.4.27-1ubuntu0.1 |
| trusty/esm | released | 0.2.4.27-1ubuntu0.1 |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
The hidden-service feature in Tor before 0.3.0.8 allows a denial of service (assertion failure and daemon exit) in the connection_edge_process_relay_cell function via a BEGIN_DIR cell on a rendezvous circuit.
The hidden-service feature in Tor before 0.3.0.8 allows a denial of se ...
The hidden-service feature in Tor before 0.3.0.8 allows a denial of service (assertion failure and daemon exit) in the connection_edge_process_relay_cell function via a BEGIN_DIR cell on a rendezvous circuit.
EPSS
5 Medium
CVSS2
7.5 High
CVSS3