1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
|
Candidate: CVE-2011-2778
PublicDate: 2011-12-22
References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2778
Description:
Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote
attackers to cause a denial of service (memory corruption) or possibly
execute arbitrary code by (1) establishing a SOCKS connection to SocksPort
or (2) leveraging a SOCKS proxy configuration.
Ubuntu-Description:
Notes:
Bugs:
Priority: medium
Discovered-by:
Assigned-to:
Patches_tor:
upstream_tor: not-affected (0.2.2.35-1)
hardy_tor: ignored (reached end-of-life)
lucid_tor: DNE
maverick_tor: DNE
natty_tor: ignored (reached end-of-life)
oneiric_tor: ignored (reached end-of-life)
precise_tor: not-affected (0.2.2.35-1)
quantal_tor: not-affected (0.2.2.35-1)
raring_tor: not-affected (0.2.2.35-1)
devel_tor: not-affected (0.2.2.35-1)
|