Vulnerability Description
Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tor | Tor | <= 0.2.2.34 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2011/dsa-2363
- https://blog.torproject.org/blog/tor-02235-released-security-patchesPatchVendor Advisory
- http://www.debian.org/security/2011/dsa-2363
- https://blog.torproject.org/blog/tor-02235-released-security-patchesPatchVendor Advisory
FAQ
What is CVE-2011-2778?
CVE-2011-2778 is a vulnerability with a CVSS score of 7.6 (HIGH). Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS conne...
How severe is CVE-2011-2778?
CVE-2011-2778 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-2778?
Check the references section above for vendor advisories and patch information. Affected products include: Tor Tor.