Tor before 0.2.8.9 and 0.2.9.x before 0.2.9.4-alpha had internal functions that were entitled to expect that buf_t data had NUL termination, but the implementation of or/buffers.c did not ensure that NUL termination was present, which allows remote attackers to cause a denial of service (client, hidden service, relay, or authority crash) via crafted data.
Advisories
Source ID Title
EUVD EUVD EUVD-2016-9685 Tor before 0.2.8.9 and 0.2.9.x before 0.2.9.4-alpha had internal functions that were entitled to expect that buf_t data had NUL termination, but the implementation of or/buffers.c did not ensure that NUL termination was present, which allows remote attackers to cause a denial of service (client, hidden service, relay, or authority crash) via crafted data.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T02:35:01.107Z

Reserved: 2016-10-19T00:00:00

Link: CVE-2016-8860

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-01-04T20:59:00.340

Modified: 2025-04-12T10:46:40.837

Link: CVE-2016-8860

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.