CVE-2012-3518

Priority
Description
The networkstatus_parse_vote_from_string function in routerparse.c in Tor
before 0.2.2.38 does not properly handle an invalid flavor name, which
allows remote attackers to cause a denial of service (out-of-bounds read
and daemon crash) via a crafted (1) vote document or (2) consensus
document.
Notes
sbeattiemay have been introduced in 0.2.2.6-alpha
Package
Source: tor (LP Ubuntu Debian)
Upstream:released (0.2.2.38)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 ESM (Trusty Tahr):released (0.2.3.22-rc-1)
Ubuntu 16.04 LTS (Xenial Xerus):released (0.2.3.22-rc-1)
Patches:
Upstream:https://gitweb.torproject.org/tor.git/commitdiff/57e35ad3d91724882c345ac709666a551a977f0f
Upstream:https://gitweb.torproject.org/tor.git/commitdiff/55f635745afacefffdaafc72cc176ca7ab817546
More Information

Updated: 2020-09-10 02:11:19 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)