First published: Fri Jan 24 2020(Updated: )
The Hidden Service (HS) client implementation in Tor before 0.2.4.27, 0.2.5.x before 0.2.5.12, and 0.2.6.x before 0.2.6.7 allows remote servers to cause a denial of service (assertion failure and application exit) via a malformed HS descriptor.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Torproject Tor | <0.2.4.27 | |
Torproject Tor | >=0.2.5.1<0.2.5.12 | |
Torproject Tor | >=0.2.6.1<0.2.6.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2015-2929.
The severity of CVE-2015-2929 is high with a CVSS score of 7.5.
The Tor software versions before 0.2.4.27, 0.2.5.x before 0.2.5.12, and 0.2.6.x before 0.2.6.7 are affected by CVE-2015-2929.
CVE-2015-2929 can be exploited by remote servers to cause a denial of service by sending a malformed HS descriptor.
Yes, you can find additional information about CVE-2015-2929 at the following references: [1] and [2].