5
CVSSv2

CVE-2012-3518

Published: 26/08/2012 Updated: 22/08/2013
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The networkstatus_parse_vote_from_string function in routerparse.c in Tor prior to 0.2.2.38 does not properly handle an invalid flavor name, which allows remote malicious users to cause a denial of service (out-of-bounds read and daemon crash) via a crafted (1) vote document or (2) consensus document.

Vulnerable Product Search on Vulmon Subscribe to Product

tor tor

Vendor Advisories

Several vulnerabilities have been discovered in Tor, an online privacy tool CVE-2012-3518 Avoid an uninitialised memory read when reading a vote or consensus document that has an unrecognized flavour name This could lead to a remote crash, resulting in denial of service CVE-2012-3519 Try to leak less information about what relays a clie ...