Vulnerabilities > TOR > TOR > 0.2.1.23
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2011-01-19 | CVE-2011-0491 | Improper Input Validation vulnerability in TOR The tor_realloc function in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote attackers to cause a denial of service (daemon crash) via unspecified vectors, related to "underflow errors." | 5.0 |
2011-01-19 | CVE-2011-0490 | Denial of Service vulnerability in Tor Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha makes calls to Libevent within Libevent log handlers, which might allow remote attackers to cause a denial of service (daemon crash) via vectors that trigger certain log messages. | 5.0 |
2011-01-19 | CVE-2011-0427 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in TOR Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors. | 6.8 |
2011-01-19 | CVE-2011-0016 | Resource Management Errors vulnerability in TOR Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly manage key data in memory, which might allow local users to obtain sensitive information by leveraging the ability to read memory that was previously used by a different process. | 2.1 |
2011-01-19 | CVE-2011-0015 | Improper Input Validation vulnerability in TOR Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly check the amount of compression in zlib-compressed data, which allows remote attackers to cause a denial of service via a large compression factor. | 5.0 |