No CVSS v4.0
No CVSS v3.1
No CVSS v3.0
Access Vector Network
Access Complexity High
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
This CVE is not in the KEV list.
The EPSS score is 0.03506.
Key SSVC decision points have not yet been added.
Default status is the baseline for the product, each version can override it (e.g. patched versions marked unaffected).
| Vendor | Product | Default status | Versions | ||||||
|---|---|---|---|---|---|---|---|---|---|
| n/a | n/a | affected |
|
Configuration 1 [-]
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2363-1 | tor security update |
EUVD |
EUVD-2011-2752 | Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T23:15:31.127Z
Reserved: 2011-07-19T00:00:00
Link: CVE-2011-2778
No data.
Status : Deferred
Published: 2011-12-23T03:59:22.020
Modified: 2025-04-11T00:51:21.963
Link: CVE-2011-2778
No data.
OpenCVE Enrichment
No data.
Debian DSA
EUVD