|
Message-ID: <Pine.GSO.4.51.0903172037360.17171@faron.mitre.org> Date: Tue, 17 Mar 2009 20:37:50 -0400 (EDT) From: "Steven M. Christey" <coley@...us.mitre.org> To: oss-security@...ts.openwall.com Subject: Re: CVE id request: Tor <0.2.0.34 multiple DoS ====================================================== Name: CVE-2009-0936 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0936 Reference: MLIST:[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes) Reference: URL:http://archives.seul.org/or/announce/Feb-2009/msg00000.html Reference: SECUNIA:33880 Reference: URL:http://secunia.com/advisories/33880 Unspecified vulnerability in Tor before 0.2.0.34 allows attackers to cause a denial of service (infinite loop) via "corrupt votes." ====================================================== Name: CVE-2009-0937 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0937 Reference: MLIST:[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes) Reference: URL:http://archives.seul.org/or/announce/Feb-2009/msg00000.html Reference: SECUNIA:33880 Reference: URL:http://secunia.com/advisories/33880 Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service via unknown vectors. ====================================================== Name: CVE-2009-0938 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0938 Reference: MLIST:[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes) Reference: URL:http://archives.seul.org/or/announce/Feb-2009/msg00000.html Reference: SECUNIA:33880 Reference: URL:http://secunia.com/advisories/33880 Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service (exit node crash) via "malformed input." ====================================================== Name: CVE-2009-0939 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0939 Reference: MLIST:[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes) Reference: URL:http://archives.seul.org/or/announce/Feb-2009/msg00000.html Reference: SECUNIA:33880 Reference: URL:http://secunia.com/advisories/33880 Tor before 0.2.0.34 treats incomplete IPv4 addresses as valid, which has unknown impact and attack vectors related to "Spec conformance," as demonstrated using 192.168.0.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.