Show filters
44 Total Results
Displaying 1-10 of 44
Sort by:
Attacker Value
Unknown
CVE-2014-5117
Disclosure Date: July 30, 2014 (last updated October 05, 2023)
Tor before 0.2.4.23 and 0.2.5 before 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote attackers to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a means of communicating information about hidden service names.
0
Attacker Value
Unknown
CVE-2012-2249
Disclosure Date: February 03, 2014 (last updated October 05, 2023)
Tor before 0.2.3.23-rc allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a renegotiation attempt that occurs after the initiation of the V3 link protocol.
0
Attacker Value
Unknown
CVE-2012-2250
Disclosure Date: February 03, 2014 (last updated October 05, 2023)
Tor before 0.2.3.24-rc allows remote attackers to cause a denial of service (assertion failure and daemon exit) by performing link protocol negotiation incorrectly.
0
Attacker Value
Unknown
CVE-2012-5573
Disclosure Date: January 01, 2013 (last updated October 05, 2023)
The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell reception rate) or bypass intended flow-control restrictions via a RELAY_COMMAND_SENDME command.
0
Attacker Value
Unknown
CVE-2012-4922
Disclosure Date: September 14, 2012 (last updated October 05, 2023)
The tor_timegm function in common/util.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.22-rc, does not properly validate time values, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed directory object, a different vulnerability than CVE-2012-4419.
0
Attacker Value
Unknown
CVE-2012-4419
Disclosure Date: September 14, 2012 (last updated October 05, 2023)
The compare_tor_addr_to_addr_policy function in or/policies.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.21-rc, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a zero-valued port field that is not properly handled during policy comparison.
0
Attacker Value
Unknown
CVE-2011-4894
Disclosure Date: December 23, 2011 (last updated October 04, 2023)
Tor before 0.2.2.34, when configured as a bridge, uses direct DirPort access instead of a Tor TLS connection for a directory fetch, which makes it easier for remote attackers to enumerate bridges by observing DirPort connections.
0
Attacker Value
Unknown
CVE-2011-4897
Disclosure Date: December 23, 2011 (last updated October 04, 2023)
Tor before 0.2.2.25-alpha, when configured as a relay without the Nickname configuration option, uses the local hostname as the Nickname value, which allows remote attackers to obtain potentially sensitive information by reading this value.
0
Attacker Value
Unknown
CVE-2011-4896
Disclosure Date: December 23, 2011 (last updated October 04, 2023)
Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port.
0
Attacker Value
Unknown
CVE-2011-2769
Disclosure Date: December 23, 2011 (last updated October 04, 2023)
Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values.
0