5
CVSSv2

CVE-2017-0376

Published: 09/06/2017 Updated: 03/10/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The hidden-service feature in Tor prior to 0.3.0.8 allows a denial of service (assertion failure and daemon exit) in the connection_edge_process_relay_cell function via a BEGIN_DIR cell on a rendezvous circuit.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

torproject tor

debian debian linux 9.0

debian debian linux 8.0

Vendor Advisories

Debian Bug report logs - #864424 tor onion services: remote assertion failure Package: tor; Maintainer for tor is Peter Palfrader <weasel@debianorg>; Source for tor is src:tor (PTS, buildd, popcon) Reported by: Peter Palfrader <weasel@debianorg> Date: Thu, 8 Jun 2017 13:21:01 UTC Severity: serious Tags: security ...
It has been discovered that Tor, a connection-based low-latency anonymous communication system, contain a flaw in the hidden service code when receiving a BEGIN_DIR cell on a hidden service rendezvous circuit A remote attacker can take advantage of this flaw to cause a hidden service to crash with an assertion failure (TROVE-2017-005) For the sta ...
The hidden-service feature in Tor before 0308 allows a denial of service (assertion failure and daemon exit) in the connection_edge_process_relay_cell function via a BEGIN_DIR cell on a rendezvous circuit ...

Exploits

Orion Elite Hidden IP Browser Pro versions 10 through 79 have insecure versions of Tor and OpenSSL included and also suffer from man-in-the-middle vulnerabilities ...