Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.703694
Kategorie:Debian Local Security Checks
Titel:Debian Security Advisory DSA 3694-1 (tor - security update)
Zusammenfassung:It has been discovered that Tor treats the contents of some buffer;chunks as if they were a NUL-terminated string. This issue could;enable a remote attacker to crash a Tor client, hidden service, relay,;or authority.
Beschreibung:Summary:
It has been discovered that Tor treats the contents of some buffer
chunks as if they were a NUL-terminated string. This issue could
enable a remote attacker to crash a Tor client, hidden service, relay,
or authority.

Affected Software/OS:
tor on Debian Linux

Solution:
For the stable distribution (jessie), this problem has been fixed in
version 0.2.5.12-3.

For the unstable distribution (sid), this problem has been fixed in
version 0.2.8.9-1.

For the experimental distribution, this problem has been fixed in
version 0.2.9.4-alpha-1.

We recommend that you upgrade your tor packages.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-8860
BugTraq ID: 95116
http://www.securityfocus.com/bid/95116
Debian Security Information: DSA-3694 (Google Search)
http://www.debian.org/security/2016/dsa-3694
https://security.gentoo.org/glsa/201612-45
http://openwall.com/lists/oss-security/2016/10/19/11
CopyrightCopyright (C) 2016 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.