5
CVSSv2

CVE-2018-0490

Published: 05/03/2018 Updated: 30/04/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

An issue exists in Tor prior to 0.2.9.15, 0.3.1.x prior to 0.3.1.10, and 0.3.2.x prior to 0.3.2.10. The directory-authority protocol-list subprotocol implementation allows remote malicious users to cause a denial of service (NULL pointer dereference and directory-authority crash) via a misformatted relay descriptor that is mishandled during voting.

Vulnerable Product Search on Vulmon Subscribe to Product

torproject tor 0.3.1.4

torproject tor 0.3.1.3

torproject tor 0.3.1.2

torproject tor 0.3.1.1

torproject tor 0.3.2.6

torproject tor 0.3.2.5

torproject tor 0.3.2.4

torproject tor 0.3.2.3

torproject tor 0.3.2.8

torproject tor 0.3.2.1

torproject tor 0.3.1.6

torproject tor 0.3.1.5

torproject tor 0.3.2.7

torproject tor 0.3.2.9

torproject tor 0.3.2.2

torproject tor

debian debian linux 9.0

Vendor Advisories

It has been discovered that Tor, a connection-based low-latency anonymous communication system, contains a protocol-list handling bug that could be used to remotely crash directory authorities with a null-pointer exception (TROVE-2018-001) For the stable distribution (stretch), this problem has been fixed in version 02915-1 We recommend that y ...