CVE-2011-2778 in Torinfo

Summary

Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration.

Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

Reservation

07/19/2011

Disclosure

12/22/2011

Status

Confirmed

Entries

VulDB provides additional information and datapoints for this CVE:

Sources

Want to know what is going to be exploited?

We predict KEV entries!