First published: Wed Jan 04 2017(Updated: )
Tor before 0.2.8.9 and 0.2.9.x before 0.2.9.4-alpha had internal functions that were entitled to expect that buf_t data had NUL termination, but the implementation of or/buffers.c did not ensure that NUL termination was present, which allows remote attackers to cause a denial of service (client, hidden service, relay, or authority crash) via crafted data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Torproject Tor | <=0.2.8.8 | |
Torproject Tor | =0.2.9.0-alpha | |
Torproject Tor | =0.2.9.1-alpha | |
Torproject Tor | =0.2.9.2-alpha | |
Torproject Tor | =0.2.9.3-alpha |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.