Tor "buf_pullup()" Buffer Overflow Vulnerability
RISK: High Risk
TYPE: Security software and application - Security Software & Appliance
A vulnerability has been identified in Tor, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to an error within the "buf_pullup()" function (or/buffers.c) when repacking data and can be exploited to cause a heap-based buffer overflow.
Successful exploitation may allow execution of arbitrary code but requires that the Tor session uses a SOCKS proxy (not default setting).
Impact
- Remote Code Execution
System / Technologies affected
- Tor 0.2.2.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to version 0.2.2.35.
Vulnerability Identifier
Source
Related Link
Share with