CVE-2016-1254
Description
Tor before 0.2.8.12 might allow remote attackers to cause a denial of service (client crash) via a crafted hidden service descriptor.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Tor clients before 0.2.8.12 can crash when parsing a crafted hidden service descriptor, leading to denial of service.
Vulnerability
A parsing flaw exists in Tor versions prior to 0.2.8.12 (bug 21018, introduced in 0.2.0.8-alpha). When a client attempts to fetch a hidden service descriptor, a specially crafted descriptor can trigger an off-by-one read past the end of an allocated memory region [1]. This vulnerability is present in the descriptor parsing code and affects all clients running an affected version [1].
Exploitation
An attacker who operates a malicious hidden service can craft a descriptor that exploits the parsing bug. When a Tor client (version 0.2.0.8-alpha through 0.2.8.11) attempts to visit that hidden service, the crafted descriptor is processed by the client, causing the out-of-bounds read [1]. No special network position or authentication is required beyond the ability to publish a hidden service descriptor.
Impact
Successful exploitation causes a denial of service: the Tor client crashes [1]. For builds configured with --enable-expensive-hardening, the crash is reliably triggered [1]. Non-hardened clients may crash depending on their platform's memory allocator behavior [1]. The impact is limited to client availability; no code execution or information disclosure is indicated in the available references.
Mitigation
Upgrade to Tor 0.2.8.12 or later, released on 2016-12-19 [1]. Users on the 0.2.9 branch should upgrade to 0.2.9.8 which contains the same fix [1]. Fedora package updates were also made available [2][3]. No workaround is documented; upgrading is the recommended action.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- gitweb.torproject.org/tor.git/commit/nvdPatchVendor Advisory
- lists.opensuse.org/opensuse-updates/2016-12/msg00154.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-updates/2016-12/msg00155.htmlnvdThird Party Advisory
- blog.torproject.org/blog/tor-02812-releasednvdVendor Advisory
- trac.torproject.org/projects/tor/ticket/21018nvdIssue TrackingVendor Advisory
- www.debian.org/security/2016/dsa-3741nvdThird Party Advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FXOJSMCTIOHLBRYFBVEL3CDLGPZXX6WE/nvd
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTU2R253477RZLYAJAR5DAXAON7KIVLA/nvd
News mentions
0No linked articles in our index yet.