CVE-2011-0427Improper Restriction of Operations within the Bounds of a Memory Buffer in TOR

Severity
6.8MEDIUMNVD
EPSS
5.9%
top 9.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 19
Latest updateMay 17

Description

Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages2 packages

Debiantorproject/tor< 0.2.1.29-1+3
NVDtor/tor0.2.1.28+185

Patches

🔴Vulnerability Details

3
GHSA
GHSA-2v69-c83c-r4mh: Heap-based buffer overflow in Tor before 02022-05-17
OSV
CVE-2011-0427: Heap-based buffer overflow in Tor before 02011-01-19
CVEList
CVE-2011-0427: Heap-based buffer overflow in Tor before 02011-01-19

📋Vendor Advisories

1
Debian
CVE-2011-0427: tor - Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-al...2011

💬Community

3
Bugzilla
CVE-2011-1179 spice-xpi: unitialized pointer writes possible when getting plugin properties2011-03-22
Bugzilla
CVE-2011-0015 CVE-2011-0016 CVE-2011-0427 CVE-2011-0490 CVE-2011-0491 CVE-2011-0492 CVE-2011-0493 tor: multiple security flaws fixed in 0.2.1.292011-01-20
Bugzilla
CVE-2011-0015 CVE-2011-0016 CVE-2011-0427 CVE-2011-0490 CVE-2011-0491 CVE-2011-0492 CVE-2011-0493 CVE-2010-1676 CVE-2010-0383 CVE-2010-0385 tor various flaws [epel-5]2011-01-20
CVE-2011-0427 — TOR vulnerability | cvebase