Out-of-Bounds Affecting tor package, versions <0.2.9.8-2
Threat Intelligence
EPSS
4.15% (93rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-TOR-370816
- published 5 Dec 2017
- disclosed 5 Dec 2017
Introduced: 5 Dec 2017
CVE-2016-1254 Open this link in a new tabHow to fix?
Upgrade Debian:10 tor to version 0.2.9.8-2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream tor package and not the tor package as distributed by Debian.
See How to fix? for Debian:10 relevant fixed versions and status.
Tor before 0.2.8.12 might allow remote attackers to cause a denial of service (client crash) via a crafted hidden service descriptor.
References
- https://security-tracker.debian.org/tracker/CVE-2016-1254
- https://blog.torproject.org/blog/tor-02812-released
- https://gitweb.torproject.org/tor.git/commit/?id=d978216dea6b21ac38230a59d172139185a68dbd
- https://trac.torproject.org/projects/tor/ticket/21018
- https://www.debian.org/security/2016/dsa-3741
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXOJSMCTIOHLBRYFBVEL3CDLGPZXX6WE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTU2R253477RZLYAJAR5DAXAON7KIVLA/
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00154.html
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00155.html
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-1254
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FXOJSMCTIOHLBRYFBVEL3CDLGPZXX6WE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTU2R253477RZLYAJAR5DAXAON7KIVLA/