Vulnerability Description
The hidden-service feature in Tor before 0.3.0.8 allows a denial of service (assertion failure and daemon exit) in the connection_edge_process_relay_cell function via a BEGIN_DIR cell on a rendezvous circuit.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Torproject | Tor | < 0.3.0.8 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2017/dsa-3877Third Party Advisory
- https://github.com/torproject/tor/commit/56a7c5bc15e0447203a491c1ee37de9939ad1dcIssue TrackingPatchThird Party Advisory
- https://lists.torproject.org/pipermail/tor-announce/2017-June/000131.htmlMailing ListThird Party Advisory
- https://trac.torproject.org/projects/tor/ticket/22494Issue TrackingThird Party Advisory
- http://www.debian.org/security/2017/dsa-3877Third Party Advisory
- https://github.com/torproject/tor/commit/56a7c5bc15e0447203a491c1ee37de9939ad1dcIssue TrackingPatchThird Party Advisory
- https://lists.torproject.org/pipermail/tor-announce/2017-June/000131.htmlMailing ListThird Party Advisory
- https://trac.torproject.org/projects/tor/ticket/22494Issue TrackingThird Party Advisory
FAQ
What is CVE-2017-0376?
CVE-2017-0376 is a vulnerability with a CVSS score of 7.5 (HIGH). The hidden-service feature in Tor before 0.3.0.8 allows a denial of service (assertion failure and daemon exit) in the connection_edge_process_relay_cell function via a BEGIN_DIR cell on a rendezvous ...
How severe is CVE-2017-0376?
CVE-2017-0376 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-0376?
Check the references section above for vendor advisories and patch information. Affected products include: Torproject Tor, Debian Debian Linux.