CVE-2016-8860

Tor before 0.2.8.9 and 0.2.9.x before 0.2.9.4-alpha had internal functions that were entitled to expect that buf_t data had NUL termination, but the implementation of or/buffers.c did not ensure that NUL termination was present, which allows remote attackers to cause a denial of service (client, hidden service, relay, or authority crash) via crafted data.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.2.9.0:alpha:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.2.9.1:alpha:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.2.9.2:alpha:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.2.9.3:alpha:*:*:*:*:*:*

History

No history.

Information

Published : 2017-01-04 20:59

Updated : 2024-02-04 19:11


NVD link : CVE-2016-8860

Mitre link : CVE-2016-8860

CVE.ORG link : CVE-2016-8860


JSON object : View

Products Affected

torproject

  • tor
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer