Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly manage key data in memory, which might allow local users to obtain sensitive information by leveraging the ability to read memory that was previously used by a different process.
Metrics
No CVSS v4.0
No CVSS v3.1
No CVSS v3.0
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
AV:L/AC:L/Au:N/C:P/I:N/A:N
This CVE is not in the KEV list.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
Vendors | Products |
---|---|
Tor |
|
Configuration 1 [-]
|
No data.
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2011-01-19T11:00:00
Updated: 2024-08-06T21:36:02.377Z
Reserved: 2010-12-07T00:00:00
Link: CVE-2011-0016
Vulnrichment
No data.
NVD
Status : Modified
Published: 2011-01-19T12:00:19.640
Modified: 2024-11-21T01:23:07.793
Link: CVE-2011-0016
Redhat
No data.