CVE-2016-8860

Published: 04 January 2017

Tor before 0.2.8.9 and 0.2.9.x before 0.2.9.4-alpha had internal functions that were entitled to expect that buf_t data had NUL termination, but the implementation of or/buffers.c did not ensure that NUL termination was present, which allows remote attackers to cause a denial of service (client, hidden service, relay, or authority crash) via crafted data.

From the Ubuntu security team

It was discovered that Tor improperly NUL terminated data. An attacker could possibly use this to cause a crash and denial of service.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
tor
Launchpad, Ubuntu, Debian
Upstream
Released (0.2.8.9-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(0.2.8.9-1ubuntu1)
Ubuntu 16.04 LTS (Xenial Xerus) Not vulnerable
(0.2.8.9-1ubuntu1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (0.2.4.27-1ubuntu0.1)