Description
buf_pullup in Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle unexpected arrival times of buffers with invalid layouts, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2015-2778 | buf_pullup in Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle unexpected arrival times of buffers with invalid layouts, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets. |
References
History
No history.
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-06T05:24:38.426Z
Reserved: 2015-03-24T00:00:00.000Z
Link: CVE-2015-2688
No data.
Status : Modified
Published: 2020-01-24T18:15:12.240
Modified: 2024-11-21T02:27:51.373
Link: CVE-2015-2688
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD