First published: Tue Dec 20 2016(Updated: )
Tor before 0.2.8.12 might allow remote attackers to cause a denial of service (client crash) via a crafted hidden service descriptor.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tor | 0.3.5.16-1 0.3.5.16-1+deb10u1 0.4.5.16-1 0.4.7.13-1 0.4.8.7-1 | |
Tor Project Tor | <0.2.8.12 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Red Hat Fedora | =24 | |
Red Hat Fedora | =25 | |
SUSE Linux | =42.2 | |
openSUSE | =13.2 | |
openSUSE Leap | =42.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1254 has a severity rating that indicates a potential denial of service vulnerability that may crash the Tor client.
To fix CVE-2016-1254, ensure that your Tor software is updated to version 0.2.8.12 or later.
CVE-2016-1254 affects all versions of Tor prior to 0.2.8.12.
The impact of CVE-2016-1254 on Tor users is the potential for a remote attacker to crash the Tor client.
Yes, CVE-2016-1254 is specifically related to crafted hidden service descriptors that can trigger the vulnerability.