Out-of-Bounds Memory Access in Tor Software by Tor Project
CVE-2020-15572

7.5HIGH

Key Information:

Vendor

Torproject

Status
Vendor
CVE Published:
15 July 2020

What is CVE-2020-15572?

An out-of-bounds memory access vulnerability exists in versions of Tor before 0.4.3.6. This issue can be exploited to launch a remote denial-of-service attack, resulting in a crash of the affected Tor instances that utilize Mozilla Network Security Services (NSS). This vulnerability undermines the reliability and stability of the Tor software, which is crucial for maintaining user anonymity over the internet. Users are urged to update to the latest version to mitigate potential risks associated with this flaw.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.