Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-0490


An issue was discovered in Tor before 0.2.9.15, 0.3.1.x before 0.3.1.10, and 0.3.2.x before 0.3.2.10. The directory-authority protocol-list subprotocol implementation allows remote attackers to cause a denial of service (NULL pointer dereference and directory-authority crash) via a misformatted relay descriptor that is mishandled during voting.


Published

2018-03-05T15:29:00.207

Last Modified

2024-11-21T03:38:20.493

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-476

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application torproject tor ≤ 0.2.9.14 Yes
Application torproject tor ≤ 0.3.1.9 Yes
Application torproject tor 0.3.1.1 Yes
Application torproject tor 0.3.1.2 Yes
Application torproject tor 0.3.1.3 Yes
Application torproject tor 0.3.1.4 Yes
Application torproject tor 0.3.1.5 Yes
Application torproject tor 0.3.1.6 Yes
Application torproject tor 0.3.2.1 Yes
Application torproject tor 0.3.2.2 Yes
Application torproject tor 0.3.2.3 Yes
Application torproject tor 0.3.2.4 Yes
Application torproject tor 0.3.2.5 Yes
Application torproject tor 0.3.2.6 Yes
Application torproject tor 0.3.2.7 Yes
Application torproject tor 0.3.2.8 Yes
Application torproject tor 0.3.2.9 Yes
Operating System debian debian_linux 9.0 Yes

References