CVE-2018-0490
05.03.2018, 15:29
An issue was discovered in Tor before 0.2.9.15, 0.3.1.x before 0.3.1.10, and 0.3.2.x before 0.3.2.10. The directory-authority protocol-list subprotocol implementation allows remote attackers to cause a denial of service (NULL pointer dereference and directory-authority crash) via a misformatted relay descriptor that is mishandled during voting.Enginsight
Vendor | Product | Version |
---|---|---|
torproject | tor | 𝑥 ≤ 0.2.9.14 |
torproject | tor | 0.3.1.7 ≤ 𝑥 ≤ 0.3.1.9 |
torproject | tor | 0.3.1.1:alpha |
torproject | tor | 0.3.1.2:alpha |
torproject | tor | 0.3.1.3:alpha |
torproject | tor | 0.3.1.4:alpha |
torproject | tor | 0.3.1.5:alpha |
torproject | tor | 0.3.1.6:rc |
torproject | tor | 0.3.2.1:alpha |
torproject | tor | 0.3.2.2:alpha |
torproject | tor | 0.3.2.3:alpha |
torproject | tor | 0.3.2.4:alpha |
torproject | tor | 0.3.2.5:alpha |
torproject | tor | 0.3.2.6:alpha |
torproject | tor | 0.3.2.7:rc |
torproject | tor | 0.3.2.8:rc |
torproject | tor | 0.3.2.9 |
debian | debian_linux | 9.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References