First published: Wed Jul 15 2020(Updated: )
Tor before 0.4.3.6 has an out-of-bounds memory access that allows a remote denial-of-service (crash) attack against Tor instances built to use Mozilla Network Security Services (NSS), aka TROVE-2020-001.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Torproject Tor | <0.3.5.11 | |
Torproject Tor | >0.4.2.0<0.4.2.8 | |
Torproject Tor | >0.4.3.0<0.4.3.6 | |
Torproject Tor | =0.4.4.0-alpha | |
Torproject Tor | =0.4.4.1-alpha |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Tor issue is CVE-2020-15572.
The severity of CVE-2020-15572 is high with a CVSS score of 7.5.
CVE-2020-15572 allows a remote attacker to perform a denial-of-service (crash) attack against Tor instances built to use Mozilla Network Security Services (NSS).
Tor versions up to and including 0.4.3.6 are affected by CVE-2020-15572.
To fix CVE-2020-15572, users should update their Tor version to 0.4.3.7 or later.