First published: Mon Nov 26 2012(Updated: )
It was reported [1],[2] that Tor suffered from a denial of service vulnerability due to an error when handling SENDME cells. This could be exploited to cause excessive consumption of memory resources within an entry node. This is fixed in upstream version 0.2.3.25 (git [3]). [1] <a href="https://secunia.com/advisories/51329/">https://secunia.com/advisories/51329/</a> [2] <a href="https://trac.torproject.org/projects/tor/ticket/6252">https://trac.torproject.org/projects/tor/ticket/6252</a> [3] <a href="https://gitweb.torproject.org/arma/tor.git/commitdiff/b9b54568c0bb64c32bd0b362954bdbc8c1234b16">https://gitweb.torproject.org/arma/tor.git/commitdiff/b9b54568c0bb64c32bd0b362954bdbc8c1234b16</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tor Project Tor | <=0.2.3.24 | |
Tor Project Tor | =0.0.2 | |
Tor Project Tor | =0.0.2-pre13 | |
Tor Project Tor | =0.0.2-pre14 | |
Tor Project Tor | =0.0.2-pre15 | |
Tor Project Tor | =0.0.2-pre16 | |
Tor Project Tor | =0.0.2-pre17 | |
Tor Project Tor | =0.0.2-pre18 | |
Tor Project Tor | =0.0.2-pre19 | |
Tor Project Tor | =0.0.2-pre20 | |
Tor Project Tor | =0.0.2-pre21 | |
Tor Project Tor | =0.0.2-pre22 | |
Tor Project Tor | =0.0.2-pre23 | |
Tor Project Tor | =0.0.2-pre24 | |
Tor Project Tor | =0.0.2-pre25 | |
Tor Project Tor | =0.0.2-pre26 | |
Tor Project Tor | =0.0.2-pre27 | |
Tor Project Tor | =0.0.3 | |
Tor Project Tor | =0.0.4 | |
Tor Project Tor | =0.0.5 | |
Tor Project Tor | =0.0.6 | |
Tor Project Tor | =0.0.6.1 | |
Tor Project Tor | =0.0.6.2 | |
Tor Project Tor | =0.0.7 | |
Tor Project Tor | =0.0.7.1 | |
Tor Project Tor | =0.0.7.2 | |
Tor Project Tor | =0.0.7.3 | |
Tor Project Tor | =0.0.8.1 | |
Tor Project Tor | =0.0.9.1 | |
Tor Project Tor | =0.0.9.2 | |
Tor Project Tor | =0.0.9.3 | |
Tor Project Tor | =0.0.9.4 | |
Tor Project Tor | =0.0.9.5 | |
Tor Project Tor | =0.0.9.6 | |
Tor Project Tor | =0.0.9.7 | |
Tor Project Tor | =0.0.9.8 | |
Tor Project Tor | =0.0.9.9 | |
Tor Project Tor | =0.0.9.10 | |
Tor Project Tor | =0.1.0.10 | |
Tor Project Tor | =0.1.0.11 | |
Tor Project Tor | =0.1.0.12 | |
Tor Project Tor | =0.1.0.13 | |
Tor Project Tor | =0.1.0.14 | |
Tor Project Tor | =0.1.0.15 | |
Tor Project Tor | =0.1.0.16 | |
Tor Project Tor | =0.1.0.17 | |
Tor Project Tor | =0.1.1.20 | |
Tor Project Tor | =0.1.1.21 | |
Tor Project Tor | =0.1.1.22 | |
Tor Project Tor | =0.1.1.23 | |
Tor Project Tor | =0.1.1.24 | |
Tor Project Tor | =0.1.1.25 | |
Tor Project Tor | =0.1.1.26 | |
Tor Project Tor | =0.1.2.13 | |
Tor Project Tor | =0.1.2.14 | |
Tor Project Tor | =0.1.2.15 | |
Tor Project Tor | =0.1.2.16 | |
Tor Project Tor | =0.1.2.17 | |
Tor Project Tor | =0.1.2.18 | |
Tor Project Tor | =0.1.2.19 | |
Tor Project Tor | =0.2.0.30 | |
Tor Project Tor | =0.2.0.31 | |
Tor Project Tor | =0.2.0.32 | |
Tor Project Tor | =0.2.0.33 | |
Tor Project Tor | =0.2.0.34 | |
Tor Project Tor | =0.2.0.35 | |
Tor Project Tor | =0.2.2.18 | |
Tor Project Tor | =0.2.2.19 | |
Tor Project Tor | =0.2.2.20 | |
Tor Project Tor | =0.2.2.21 | |
Tor Project Tor | =0.2.2.22 | |
Tor Project Tor | =0.2.2.23 | |
Tor Project Tor | =0.2.2.24 | |
Tor Project Tor | =0.2.2.25 | |
Tor Project Tor | =0.2.2.26 | |
Tor Project Tor | =0.2.2.27 | |
Tor Project Tor | =0.2.2.28 | |
Tor Project Tor | =0.2.2.29 | |
Tor Project Tor | =0.2.2.30 | |
Tor Project Tor | =0.2.2.31 | |
Tor Project Tor | =0.2.2.32 | |
Tor Project Tor | =0.2.2.33 | |
Tor Project Tor | =0.2.2.34 | |
Tor Project Tor | =0.2.2.35 | |
Tor Project Tor | =0.2.2.36 | |
Tor Project Tor | =0.2.2.37 | |
Tor Project Tor | =0.2.2.38 | |
Tor Project Tor | =0.2.3 | |
Tor Project Tor | =0.2.3.13-alpha | |
Tor Project Tor | =0.2.3.14-alpha | |
Tor Project Tor | =0.2.3.15-alpha | |
Tor Project Tor | =0.2.3.16-alpha | |
Tor Project Tor | =0.2.3.17-beta | |
Tor Project Tor | =0.2.3.18-rc | |
Tor Project Tor | =0.2.3.19-rc | |
Tor Project Tor | =0.2.3.20-rc | |
Tor Project Tor | =0.2.3.21-rc | |
Tor Project Tor | =0.2.3.22-rc | |
Tor Project Tor | =0.2.3.23-rc |
https://gitweb.torproject.org/arma/tor.git/commitdiff/b9b54568c0bb64c32bd0b362954bdbc8c1234b16
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5573 has been classified as a denial of service vulnerability due to excessive memory consumption.
To mitigate CVE-2012-5573, upgrade to upstream version 0.2.3.25 or later of Tor.
CVE-2012-5573 affects various versions of Tor prior to 0.2.3.25, including several release candidates and earlier versions.
CVE-2012-5573 can be exploited by sending specially crafted SENDME cells to overwhelm an entry node's memory.
Yes, a patch is included in the Tor release version 0.2.3.25 and later to address CVE-2012-5573.