CVE-2015-2689
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
24/01/2020
Last modified:
31/01/2020
Description
Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle pending-connection resolve states during periods of high DNS load, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:* | 0.2.4.26 (excluding) | |
| cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:* | 0.2.5.1 (including) | 0.2.5.11 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



