7.8
CVSSv2

CVE-2020-10592

Published: 23/03/2020 Updated: 01/01/2022
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

Tor prior to 0.3.5.10, 0.4.x prior to 0.4.1.9, and 0.4.2.x prior to 0.4.2.7 allows remote malicious users to cause a Denial of Service (CPU consumption), aka TROVE-2020-002.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

torproject tor

opensuse backports sle-15

opensuse leap 15.1

Vendor Advisories

A denial of service vulnerability (by triggering high CPU consumption) was found in Tor, a connection-based low-latency anonymous communication system For the stable distribution (buster), this problem has been fixed in version 03510-1 For the oldstable distribution (stretch), support for tor is now discontinued Please upgrade to the stable r ...