Vulnerabilities > CVE-2011-0016 - Resource Management Errors vulnerability in TOR
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly manage key data in memory, which might allow local users to obtain sensitive information by leveraging the ability to read memory that was previously used by a different process.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family Fedora Local Security Checks NASL id FEDORA_2011-0650.NASL description - Mon Jan 17 2011 Enrico Scholz <enrico.scholz at informatik.tu-chemnitz.de> - 0.2.1.29-1300 - updated to 0.2.1.29 (SECURITY) - CVE-2011-0427: heap overflow bug, potential remote code execution - Tue Dec 21 2010 Luke Macken <lmacken at redhat.com> - 0.2.1.28-1300 - updated to 0.2.1.28 (SECURITY: fixes a remotely exploitable heap overflow bug) - Fri Nov 26 2010 Enrico Scholz <enrico.scholz at informatik.tu-chemnitz.de> - 0.2.1.27-1300 - updated to 0.2.1.27 - work around broken chkconfig by adding dummy Default-Start: in -lsb (#647512) - Fri Nov 26 2010 Enrico Scholz <enrico.scholz at informatik.tu-chemnitz.de> - fixed last seen 2020-06-01 modified 2020-06-02 plugin id 55002 published 2011-06-09 reporter This script is Copyright (C) 2011-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/55002 title Fedora 13 : tor-0.2.1.29-1300.fc13 (2011-0650) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory 2011-0650. # include("compat.inc"); if (description) { script_id(55002); script_version("1.10"); script_cvs_date("Date: 2019/08/02 13:32:33"); script_cve_id("CVE-2011-0015", "CVE-2011-0016", "CVE-2011-0427", "CVE-2011-0490", "CVE-2011-0491", "CVE-2011-0492", "CVE-2011-0493"); script_bugtraq_id(45832, 45953); script_xref(name:"FEDORA", value:"2011-0650"); script_name(english:"Fedora 13 : tor-0.2.1.29-1300.fc13 (2011-0650)"); script_summary(english:"Checks rpm output for the updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: " - Mon Jan 17 2011 Enrico Scholz <enrico.scholz at informatik.tu-chemnitz.de> - 0.2.1.29-1300 - updated to 0.2.1.29 (SECURITY) - CVE-2011-0427: heap overflow bug, potential remote code execution - Tue Dec 21 2010 Luke Macken <lmacken at redhat.com> - 0.2.1.28-1300 - updated to 0.2.1.28 (SECURITY: fixes a remotely exploitable heap overflow bug) - Fri Nov 26 2010 Enrico Scholz <enrico.scholz at informatik.tu-chemnitz.de> - 0.2.1.27-1300 - updated to 0.2.1.27 - work around broken chkconfig by adding dummy Default-Start: in -lsb (#647512) - Fri Nov 26 2010 Enrico Scholz <enrico.scholz at informatik.tu-chemnitz.de> - fixed 'limit' statement in upstart script - Tue Jun 1 2010 Enrico Scholz <enrico.scholz at informatik.tu-chemnitz.de> - 0.2.1.26-1300 - updated to 0.2.1.26 - removed workaround to install lsb initscript because parts of the underlying problem have been fixed in redhat-lsb and the remaining ones were solved by previous commit - Tue Jun 1 2010 Enrico Scholz <enrico.scholz at informatik.tu-chemnitz.de> - 0.2.1.25-1301 - removed $local_fs dependency in -lsb initscript to workaround buggy redhat-lsb; $remote_fs should imply it - Thu Mar 18 2010 Enrico Scholz <enrico.scholz at informatik.tu-chemnitz.de> - 0.2.1.25-1300 - updated to 0.2.1.25 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=671259" ); # https://lists.fedoraproject.org/pipermail/package-announce/2011-June/061286.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?204d659a" ); script_set_attribute(attribute:"solution", value:"Update the affected tor package."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:tor"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:13"); script_set_attribute(attribute:"patch_publication_date", value:"2011/01/21"); script_set_attribute(attribute:"plugin_publication_date", value:"2011/06/09"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2011-2019 Tenable Network Security, Inc."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! ereg(pattern:"^13([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 13.x", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC13", reference:"tor-0.2.1.29-1300.fc13")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "tor"); }
NASL family Fedora Local Security Checks NASL id FEDORA_2011-0642.NASL description - Mon Jan 17 2011 Enrico Scholz <enrico.scholz at informatik.tu-chemnitz.de> - 0.2.1.29-1400 - updated to 0.2.1.29 (SECURITY) - CVE-2011-0427: heap overflow bug, potential remote code execution - Tue Dec 21 2010 Luke Macken <lmacken at redhat.com> - 0.2.1.28-1400 - updated to 0.2.1.28 (SECURITY: fixes a remotely exploitable heap overflow bug) - Fri Nov 26 2010 Enrico Scholz <enrico.scholz at informatik.tu-chemnitz.de> - 0.2.1.27-1400 - updated to 0.2.1.27 - work around broken chkconfig by adding dummy Default-Start: in -lsb (#647512) - Fri Nov 26 2010 Enrico Scholz <enrico.scholz at informatik.tu-chemnitz.de> - 0.2.1.26-1401 - fixed last seen 2020-06-01 modified 2020-06-02 plugin id 53901 published 2011-05-16 reporter This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/53901 title Fedora 14 : tor-0.2.1.29-1400.fc14 (2011-0642) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201110-13.NASL description The remote host is affected by the vulnerability described in GLSA-201110-13 (Tor: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Tor. Please review the CVE identifiers referenced below for details. Impact : A remote unauthenticated attacker may be able to execute arbitrary code with the privileges of the Tor process or create a Denial of Service. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 56549 published 2011-10-19 reporter This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/56549 title GLSA-201110-13 : Tor: Multiple vulnerabilities
References
- http://www.securityfocus.com/bid/45832
- https://trac.torproject.org/projects/tor/ticket/2384
- http://archives.seul.org/or/announce/Jan-2011/msg00000.html
- http://blog.torproject.org/blog/tor-02129-released-security-patches
- http://secunia.com/advisories/42907
- http://www.vupen.com/english/advisories/2011/0131
- https://trac.torproject.org/projects/tor/ticket/2385
- https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog
- http://www.securitytracker.com/id?1024980
- http://www.debian.org/security/2011/dsa-2148
- http://www.openwall.com/lists/oss-security/2011/01/18/7
- http://www.vupen.com/english/advisories/2011/0132
- http://secunia.com/advisories/42905