CVE-2011-0491

high

Description

The tor_realloc function in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote attackers to cause a denial of service (daemon crash) via unspecified vectors, related to "underflow errors."

References

https://trac.torproject.org/projects/tor/ticket/2324

https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog

https://exchange.xforce.ibmcloud.com/vulnerabilities/64888

http://www.securityfocus.com/bid/45953

http://blog.torproject.org/blog/tor-02129-released-security-patches

http://archives.seul.org/or/announce/Jan-2011/msg00000.html

Details

Source: Mitre, NVD

Published: 2011-01-19

Updated: 2017-08-17

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Severity: Medium

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Severity: High