Skip to main content

Tor "buf_pullup()" Buffer Overflow Vulnerability

Last Update Date: 20 Dec 2011 11:08 Release Date: 20 Dec 2011 4405 Views

RISK: High Risk

TYPE: Security software and application - Security Software & Appliance

TYPE: Security Software & Appliance

A vulnerability has been identified in Tor, which can be exploited by malicious people to compromise a user's system.

 

The vulnerability is caused due to an error within the "buf_pullup()" function (or/buffers.c) when repacking data and can be exploited to cause a heap-based buffer overflow.

 

Successful exploitation may allow execution of arbitrary code but requires that the Tor session uses a SOCKS proxy (not default setting).


Impact

  • Remote Code Execution

System / Technologies affected

  • Tor 0.2.2.x

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Update to version 0.2.2.35.

Vulnerability Identifier


Source


Related Link