SB2017092916 - Fedora EPEL 7 update for tor



SB2017092916 - Fedora EPEL 7 update for tor

Published: September 29, 2017 Updated: April 24, 2025

Security Bulletin ID SB2017092916
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2017-0380)

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists in the rend_service_intro_established() function in 'or/rendservice.c due to the system may log uninitialized stack contents when a certain hidden service error occurs while SafeLogging is disabled. A remote attacker can use an error message about the construction of an introduction point circuit and gain access to potentially sensitive information from uninitialized stack memory.


2) Reachable Assertion (CVE-ID: CVE-2017-0375)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The hidden-service feature in Tor before 0.3.0.8 allows a denial of service (assertion failure and daemon exit) in the relay_send_end_cell_from_edge_ function via a malformed BEGIN cell.


3) Reachable Assertion (CVE-ID: CVE-2017-0376)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The hidden-service feature in Tor before 0.3.0.8 allows a denial of service (assertion failure and daemon exit) in the connection_edge_process_relay_cell function via a BEGIN_DIR cell on a rendezvous circuit.


Remediation

Install update from vendor's website.