Heap-based buffer overflow in Tor - CVE-2011-0427
Published: January 19, 2011 / Updated: January 12, 2023
Tor
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha. A remote attacker can use unspecified vectors. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2011-0427
Sources
- http://archives.seul.org/or/announce/Jan-2011/msg00000.html
- http://blog.torproject.org/blog/tor-02129-released-security-patches
- http://secunia.com/advisories/42905
- http://secunia.com/advisories/42907
- http://www.debian.org/security/2011/dsa-2148
- http://www.securityfocus.com/bid/45832
- http://www.securitytracker.com/id?1024980
- http://www.vupen.com/english/advisories/2011/0131
- http://www.vupen.com/english/advisories/2011/0132
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64748
- https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog