SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Tor Vendors:   tor.eff.org
Tor Flaw in rend_service_intro_established() When SafeLogging is Disabled Lets Remote Users Obtain Potentially Sensitive Information on the Target System
SecurityTracker Alert ID:  1039519
SecurityTracker URL:  http://securitytracker.com/id/1039519
CVE Reference:   CVE-2017-0380   (Links to External Site)
Date:  Oct 9 2017
Impact:   Disclosure of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Tor. A remote user can obtain potentially sensitive information on the target system.

The system may log uninitialized stack contents when a certain hidden service error occurs while SafeLogging is disabled. A remote user may be able to obtain potentially sensitive information on the target system via an error message about the construction of an introduction point circuit.

The rend_service_intro_established() function in 'or/rendservice.c' is affected.

Impact:   A remote user can obtain potentially sensitive information from uninitialized stack memory on the target system.
Solution:   The vendor has issued a fix (0.2.8.15, 0.2.9.12, 0.3.0.11).

The vendor advisory is available at:

https://lists.torproject.org/pipermail/tor-talk/2017-September/043585.html

Vendor URL:  blog.torproject.org/new-tor-stable-releases-02815-02912-03011-fix-onion-service-security-issue (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC