Cyber security research. Reverse engineering - Hacker hunter - Malware research.
Se afișează postările cu eticheta vulnerable. Afișați toate postările
Se afișează postările cu eticheta vulnerable. Afișați toate postările
duminică, 10 iunie 2012
miercuri, 25 ianuarie 2012
Tor Vulnerable to Remote arbitrary code Execution
Using this Vulnerability remote attacker could possibly execute arbitrary code or cause a Denial of Service. Furthermore, a remote relay the user is directly connected to may be able to disclose anonymous information about that user or enumerate bridges in the user's connection.
Advisory explain that , Affected Vulnerable packages are < 0.2.2.35 . Multiple vulnerabilities have been discovered in Tor are listed below:
* When configured as client or bridge, Tor uses the same TLS certificate chain for all outgoing connections (CVE-2011-2768).
* When configured as a bridge, Tor relays can distinguish incoming bridge connections from client connections (CVE-2011-2769).
* An error in or/buffers.c could result in a heap-based buffer overflow (CVE-2011-2778).
Abonați-vă la:
Postări (Atom)