Computer Security
[EN] securityvulns.ru no-pyccku


tor buffer overflows
Published:26.12.2011
Source:
SecurityVulns ID:12108
Type:remote
Threat Level:
5/10
Description:Heap buffer overflow on SOCKS request parsing.
Affected:TOR : tor 0.2
CVE:CVE-2011-2778 (Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration.)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod