Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tor | Tor | * | 0.2.2.37 (including) |
Tor | Ubuntu | devel | * |
Tor | Ubuntu | hardy | * |
Tor | Ubuntu | natty | * |
Tor | Ubuntu | oneiric | * |
Tor | Ubuntu | precise | * |
Tor | Ubuntu | quantal | * |
Tor | Ubuntu | raring | * |
Tor | Ubuntu | saucy | * |
Tor | Ubuntu | trusty | * |
Tor | Ubuntu | upstream | * |
Tor | Ubuntu | utopic | * |
Tor | Ubuntu | vivid | * |
Tor | Ubuntu | wily | * |
Tor | Ubuntu | xenial | * |
Tor | Ubuntu | yakkety | * |
Tor | Ubuntu | zesty | * |