FreeBSD : tor -- Use-after-free in onion service v2 (36ef8753-d86f-11e7-ad28-0025908740c2)

high Nessus Plugin ID 105214

Language:

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

The Torproject.org reports :

- TROVE-2017-009: Replay-cache ineffective for v2 onion services

- TROVE-2017-010: Remote DoS attack against directory authorities

- TROVE-2017-011: An attacker can make Tor ask for a password

- TROVE-2017-012: Relays can pick themselves in a circuit path

- TROVE-2017-013: Use-after-free in onion service v2

Solution

Update the affected package.

See Also

http://www.nessus.org/u?9d0b8d2c

http://www.nessus.org/u?6bd5084b

Plugin Details

Severity: High

ID: 105214

File Name: freebsd_pkg_36ef8753d86f11e7ad280025908740c2.nasl

Version: 3.5

Type: local

Published: 12/14/2017

Updated: 1/4/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:tor, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 12/14/2017

Vulnerability Publication Date: 12/1/2017

Reference Information

CVE: CVE-2017-8819