Vulnerabilities > TOR > TOR > 0.1.2.19

DATE CVE VULNERABILITY TITLE RISK
2011-01-19 CVE-2011-0491 Improper Input Validation vulnerability in TOR
The tor_realloc function in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote attackers to cause a denial of service (daemon crash) via unspecified vectors, related to "underflow errors."
network
low complexity
tor CWE-20
5.0
2011-01-19 CVE-2011-0490 Denial of Service vulnerability in Tor
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha makes calls to Libevent within Libevent log handlers, which might allow remote attackers to cause a denial of service (daemon crash) via vectors that trigger certain log messages.
network
low complexity
tor
5.0
2011-01-19 CVE-2011-0427 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in TOR
Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
network
tor CWE-119
6.8
2011-01-19 CVE-2011-0016 Resource Management Errors vulnerability in TOR
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly manage key data in memory, which might allow local users to obtain sensitive information by leveraging the ability to read memory that was previously used by a different process.
local
low complexity
tor CWE-399
2.1
2011-01-19 CVE-2011-0015 Improper Input Validation vulnerability in TOR
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly check the amount of compression in zlib-compressed data, which allows remote attackers to cause a denial of service via a large compression factor.
network
low complexity
tor CWE-20
5.0
2010-12-22 CVE-2010-1676 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in TOR
Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors.
network
low complexity
tor CWE-119
critical
10.0
2010-01-25 CVE-2010-0385 Information Exposure vulnerability in TOR
Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, when functioning as a bridge directory authority, allows remote attackers to obtain sensitive information about bridge identities and bridge descriptors via a dbg-stability.txt directory query.
network
low complexity
tor CWE-200
5.0
2010-01-25 CVE-2010-0383 Information Exposure vulnerability in TOR
Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations.
network
low complexity
tor CWE-200
5.0
2009-02-03 CVE-2009-0414 Resource Management Errors vulnerability in TOR
Unspecified vulnerability in Tor before 0.2.0.33 has unspecified impact and remote attack vectors that trigger heap corruption.
network
low complexity
tor CWE-399
critical
10.0
2008-12-09 CVE-2008-5398 Permissions, Privileges, and Access Controls vulnerability in TOR
Tor before 0.2.0.32 does not properly process the ClientDNSRejectInternalAddresses configuration option in situations where an exit relay issues a policy-based refusal of a stream, which allows remote exit relays to have an unknown impact by mapping an internal IP address to the destination hostname of a refused stream.
network
tor CWE-264
critical
9.3