CVE Vulnerabilities

CVE-2018-0490

NULL Pointer Dereference

Published: Mar 05, 2018 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in Tor before 0.2.9.15, 0.3.1.x before 0.3.1.10, and 0.3.2.x before 0.3.2.10. The directory-authority protocol-list subprotocol implementation allows remote attackers to cause a denial of service (NULL pointer dereference and directory-authority crash) via a misformatted relay descriptor that is mishandled during voting.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
TorTorproject*0.2.9.14 (including)
TorTorproject0.3.1.7 (including)0.3.1.9 (including)
TorTorproject0.3.1.1-alpha (including)0.3.1.1-alpha (including)
TorTorproject0.3.1.2-alpha (including)0.3.1.2-alpha (including)
TorTorproject0.3.1.3-alpha (including)0.3.1.3-alpha (including)
TorTorproject0.3.1.4-alpha (including)0.3.1.4-alpha (including)
TorTorproject0.3.1.5-alpha (including)0.3.1.5-alpha (including)
TorTorproject0.3.1.6-rc (including)0.3.1.6-rc (including)
TorTorproject0.3.2.1-alpha (including)0.3.2.1-alpha (including)
TorTorproject0.3.2.2-alpha (including)0.3.2.2-alpha (including)
TorTorproject0.3.2.3-alpha (including)0.3.2.3-alpha (including)
TorTorproject0.3.2.4-alpha (including)0.3.2.4-alpha (including)
TorTorproject0.3.2.5-alpha (including)0.3.2.5-alpha (including)
TorTorproject0.3.2.6-alpha (including)0.3.2.6-alpha (including)
TorTorproject0.3.2.7-rc (including)0.3.2.7-rc (including)
TorTorproject0.3.2.8-rc (including)0.3.2.8-rc (including)
TorTorproject0.3.2.9 (including)0.3.2.9 (including)
TorUbuntuartful*
TorUbuntuesm-apps/xenial*
TorUbuntuupstream*
TorUbuntuxenial*

Potential Mitigations

References