The Hidden Service (HS) server implementation in Tor before 0.2.4.27, 0.2.5.x before 0.2.5.12, and 0.2.6.x before 0.2.6.7 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via unspecified vectors.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Tor | Torproject | * | 0.2.4.27 (excluding) | 
| Tor | Torproject | 0.2.5.1 (including) | 0.2.5.12 (excluding) | 
| Tor | Torproject | 0.2.6.1 (including) | 0.2.6.7 (excluding) | 
| Tor | Ubuntu | esm-infra-legacy/trusty | * | 
| Tor | Ubuntu | precise | * | 
| Tor | Ubuntu | trusty | * | 
| Tor | Ubuntu | trusty/esm | * | 
| Tor | Ubuntu | upstream | * | 
| Tor | Ubuntu | utopic | * | 
| Tor | Ubuntu | vivid | * |