5
CVSSv2

CVE-2021-28089

Published: 19/03/2021 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Tor prior to 0.4.5.7 allows a remote participant in the Tor directory protocol to exhaust CPU resources on a target, aka TROVE-2021-001.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

torproject tor 0.4.4.1

torproject tor 0.4.4.0

torproject tor

torproject tor 0.4.4.2

torproject tor 0.4.4.3

fedoraproject fedora 33

Vendor Advisories

Two vulnerabilities were discovered in Tor, a connection-based low-latency anonymous communication system, which could lead to excessive CPU usage or cause a directory authority to crash For the stable distribution (buster), these problems have been fixed in version 03514-1 We recommend that you upgrade your tor packages For the detailed secu ...
A security issue was found in Tor before versions 0457, 0448 and 03514 The dump_desc() function was called incorrectly in several places in a way that could lead to excessive CPU usage ...