Resource Management Errors Affecting tor package, versions <0.2.3.25-1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-TOR-371061
- published 1 Jan 2013
- disclosed 1 Jan 2013
Introduced: 1 Jan 2013
CVE-2012-5573 Open this link in a new tabHow to fix?
Upgrade Debian:10 tor to version 0.2.3.25-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream tor package and not the tor package as distributed by Debian.
See How to fix? for Debian:10 relevant fixed versions and status.
The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell reception rate) or bypass intended flow-control restrictions via a RELAY_COMMAND_SENDME command.
References
- https://security-tracker.debian.org/tracker/CVE-2012-5573
- http://security.gentoo.org/glsa/glsa-201301-03.xml
- https://bugs.gentoo.org/show_bug.cgi?id=444804
- https://gitweb.torproject.org/arma/tor.git/commitdiff/b9b54568c0bb64c32bd0b362954bdbc8c1234b16
- https://gitweb.torproject.org/tor.git/blob/release-0.2.3:/ReleaseNotes
- https://trac.torproject.org/projects/tor/ticket/6252
- http://openwall.com/lists/oss-security/2012/11/26/11
- https://bugzilla.redhat.com/show_bug.cgi?id=880310
- http://secunia.com/advisories/51329
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80289