CVE-2015-2689
24.01.2020, 18:15
Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle pending-connection resolve states during periods of high DNS load, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.Enginsight
Vendor | Product | Version |
---|---|---|
torproject | tor | 𝑥 < 0.2.4.26 |
torproject | tor | 0.2.5.1 ≤ 𝑥 < 0.2.5.11 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration