~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
Candidate: CVE-2011-2778
PublicDate: 2011-12-22
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2778
Description:
 Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote
 attackers to cause a denial of service (memory corruption) or possibly
 execute arbitrary code by (1) establishing a SOCKS connection to SocksPort
 or (2) leveraging a SOCKS proxy configuration.
Ubuntu-Description:
Notes:
Bugs:
Priority: medium
Discovered-by:
Assigned-to:

Patches_tor:
upstream_tor: not-affected (0.2.2.35-1)
hardy_tor: ignored (reached end-of-life)
lucid_tor: DNE
maverick_tor: DNE
natty_tor: ignored (reached end-of-life)
oneiric_tor: ignored (reached end-of-life)
precise_tor: not-affected (0.2.2.35-1)
quantal_tor: not-affected (0.2.2.35-1)
raring_tor: not-affected (0.2.2.35-1)
devel_tor: not-affected (0.2.2.35-1)