First published: Mon May 16 2011(Updated: )
A vulnerability in Tor was reported [1] that could allow a malicious remote attacker to cause a denial of service. This vulnerability is due to a boundary error within the policy_summarize() function in src/or/policies.c which can be exploited to crash a Tor directory authority. Upstream announced the release of 0.2.1.30 [2] that is noted to correct this flaw. [1] <a href="http://secunia.com/advisories/43548/">http://secunia.com/advisories/43548/</a> [2] <a href="https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html">https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Tor Project Tor | <0.2.1.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-705192 is significant as it can lead to a denial of service attack against Tor directory authorities.
To fix REDHAT-BUG-705192, update Tor to a version that is newer than 0.2.1.30, as the vulnerability has been addressed in later releases.
REHDAT-BUG-705192 affects users running Tor versions up to 0.2.1.30.
The vulnerability in REDHAT-BUG-705192 is due to a boundary error within the policy_summarize() function in src/or/policies.c.
Yes, REDHAT-BUG-705192 can be exploited by a malicious remote attacker to crash a Tor directory authority.