Computer Security
[EN] securityvulns.ru no-pyccku


tor buffer overflow
updated since 28.12.2010
Published:28.12.2010
Source:
SecurityVulns ID:11325
Type:remote
Threat Level:
6/10
Description:Buffer overflow on request parsing.
Affected:TOR : tor 0.2
CVE:CVE-2010-1676 (Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors.)
Original documentdocumentDEBIAN, [SECURITY] [DSA-2136-1] New tor packages fix potential code execution (28.12.2010)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod