SB2011101802 - Gentoo update for Tor
Published: October 18, 2011 Updated: January 12, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 8 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2011-0015)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly check the amount of compression in zlib-compressed data, which allows remote attackers to cause a denial of service via a large compression factor.
2) Resource management error (CVE-ID: CVE-2011-0016)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly manage key data in memory, which might allow local users to obtain sensitive information by leveraging the ability to read memory that was previously used by a different process.
3) Heap-based buffer overflow (CVE-ID: CVE-2011-0427)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha. A remote attacker can use unspecified vectors. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Input validation error (CVE-ID: CVE-2011-0490)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha makes calls to Libevent within Libevent log handlers, which might allow remote attackers to cause a denial of service (daemon crash) via vectors that trigger certain log messages.
5) Input validation error (CVE-ID: CVE-2011-0491)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The tor_realloc function in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote attackers to cause a denial of service (daemon crash) via unspecified vectors, related to "underflow errors."
6) Resource management error (CVE-ID: CVE-2011-0492)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (assertion failure and daemon exit) via blobs that trigger a certain file size, as demonstrated by the cached-descriptors.new file.
7) Input validation error (CVE-ID: CVE-2011-0493)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha might allow remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors related to malformed router caches and improper handling of integer values.
8) Buffer overflow (CVE-ID: CVE-2011-1924)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Buffer overflow in the policy_summarize function in or/policies.c in Tor before 0.2.1.30 allows remote attackers to cause a denial of service (directory authority crash) via a crafted policy that triggers creation of a long port list.
Remediation
Install update from vendor's website.