CVE-2011-0016Heap-based Buffer Overflow in TOR

Severity
2.1LOWNVD
EPSS
0.1%
top 80.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 19
Latest updateMay 3

Description

Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly manage key data in memory, which might allow local users to obtain sensitive information by leveraging the ability to read memory that was previously used by a different process.

CVSS vector

AV:L/AC:L/C:P/I:N/A:NExploitability: 3.9 | Impact: 2.9

Affected Packages2 packages

Debiantorproject/tor< 0.2.1.29-1+3
NVDtor/tor0.2.1.28+185

Patches

🔴Vulnerability Details

3
GHSA
GHSA-qr37-7423-hq8p: Tor before 02022-05-03
OSV
CVE-2011-0016: Tor before 02011-01-19
CVEList
CVE-2011-0016: Tor before 02011-01-19

📋Vendor Advisories

3
Red Hat
libxml2: Heap-based buffer overflow when decoding an entity reference with a long name2012-01-06
Red Hat
libxml2 out of bounds read2011-12-13
Debian
CVE-2011-0016: tor - Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly manage k...2011

💬Community

2
Bugzilla
CVE-2011-0015 CVE-2011-0016 CVE-2011-0427 CVE-2011-0490 CVE-2011-0491 CVE-2011-0492 CVE-2011-0493 tor: multiple security flaws fixed in 0.2.1.292011-01-20
Bugzilla
CVE-2011-0015 CVE-2011-0016 CVE-2011-0427 CVE-2011-0490 CVE-2011-0491 CVE-2011-0492 CVE-2011-0493 CVE-2010-1676 CVE-2010-0383 CVE-2010-0385 tor various flaws [epel-5]2011-01-20
CVE-2011-0016 — Heap-based Buffer Overflow in TOR | cvebase