An issue was discovered in Tor before 0.2.9.15, 0.3.1.x before 0.3.1.10, and 0.3.2.x before 0.3.2.10. The directory-authority protocol-list subprotocol implementation allows remote attackers to cause a denial of service (NULL pointer dereference and directory-authority crash) via a misformatted relay descriptor that is mishandled during voting.
2018-03-05T15:29:00.207
2024-11-21T03:38:20.493
Modified
CVSSv3.0: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | torproject | tor | ≤ 0.2.9.14 | Yes |
Application | torproject | tor | ≤ 0.3.1.9 | Yes |
Application | torproject | tor | 0.3.1.1 | Yes |
Application | torproject | tor | 0.3.1.2 | Yes |
Application | torproject | tor | 0.3.1.3 | Yes |
Application | torproject | tor | 0.3.1.4 | Yes |
Application | torproject | tor | 0.3.1.5 | Yes |
Application | torproject | tor | 0.3.1.6 | Yes |
Application | torproject | tor | 0.3.2.1 | Yes |
Application | torproject | tor | 0.3.2.2 | Yes |
Application | torproject | tor | 0.3.2.3 | Yes |
Application | torproject | tor | 0.3.2.4 | Yes |
Application | torproject | tor | 0.3.2.5 | Yes |
Application | torproject | tor | 0.3.2.6 | Yes |
Application | torproject | tor | 0.3.2.7 | Yes |
Application | torproject | tor | 0.3.2.8 | Yes |
Application | torproject | tor | 0.3.2.9 | Yes |
Operating System | debian | debian_linux | 9.0 | Yes |