CVE-2011-2778
Published: 23 December 2011
Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration.
Priority
Status
Package | Release | Status |
---|---|---|
tor Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Does not exist
|
|
maverick |
Does not exist
|
|
natty |
Ignored
(end of life)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Not vulnerable
(0.2.2.35-1)
|
|
quantal |
Not vulnerable
(0.2.2.35-1)
|
|
raring |
Not vulnerable
(0.2.2.35-1)
|
|
upstream |
Not vulnerable
(0.2.2.35-1)
|