Unrated severityNVD Advisory· Published Jan 24, 2020· Updated Aug 6, 2024
CVE-2015-2689
CVE-2015-2689
Description
Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle pending-connection resolve states during periods of high DNS load, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.
Affected products
1- Range: before 0.2.4.26
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- lists.torproject.org/pipermail/tor-talk/2015-March/037281.htmlmitrex_refsource_MISC
- trac.torproject.org/projects/tor/ticket/14129mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.