Buffer overflow in Tor - CVE-2011-2778
Published: December 23, 2011 / Updated: August 11, 2020
Tor
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration.