CVE-2015-2689 PUBLISHED

Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle pending-connection resolve states during periods of high DNS load, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.

EPSS 0.65% · 70.6th percentile

Risk Scores

EPSS Score
0.65%
70.6th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTStor0, 0.2.3.25-1, 0.2.4.19-1

Timeline

References

Open in Interactive Console →