5
CVSSv2

CVE-2015-2688

Published: 24/01/2020 Updated: 31/01/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

buf_pullup in Tor prior to 0.2.4.26 and 0.2.5.x prior to 0.2.5.11 does not properly handle unexpected arrival times of buffers with invalid layouts, which allows remote malicious users to cause a denial of service (assertion failure and daemon exit) via crafted packets.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

torproject tor

Vendor Advisories

Several denial-of-service issues have been discovered in Tor, a connection-based low-latency anonymous communication system Jowr discovered that very high DNS query load on a relay could trigger an assertion error A relay could crash with an assertion error if a buffer of exactly the wrong layout was passed to buf_pullup() at exactly ...