CVE-2020-15572
Summary
| CVE | CVE-2020-15572 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-07-15 17:15:00 UTC |
| Updated | 2021-07-21 11:39:00 UTC |
| Description | Tor before 0.4.3.6 has an out-of-bounds memory access that allows a remote denial-of-service (crash) attack against Tor instances built to use Mozilla Network Security Services (NSS), aka TROVE-2020-001. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Resolve TROVE-2020-001 (denial-of-service against Tor built with NSS) (#33119) · Issues · The Tor Project / Core / Tor · GitLab |
MISC |
gitlab.torproject.org |
Vendor Advisory |
| TROVE – Tor Bug Tracker & Wiki |
MISC |
trac.torproject.org |
Vendor Advisory |
| New releases: Tor 0.3.5.11, 0.4.2.8, and 0.4.3.6 (with security fixes) | Tor Blog |
CONFIRM |
blog.torproject.org |
Release Notes, Vendor Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 750586 OpenSUSE Security Update for tor (openSUSE-SU-2020:1970-1)