ID

VAR-201209-0470


CVE

CVE-2012-4922


TITLE

Tor of common/util.c Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2012-004416

DESCRIPTION

The tor_timegm function in common/util.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.22-rc, does not properly validate time values, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed directory object, a different vulnerability than CVE-2012-4419. Tor (The Onion Router) is an implementation of the second generation of onion routing, which allows users to communicate anonymously over the Internet. Tor is prone to multiple denial-of-service vulnerabilities. Exploiting these issues can allow attackers to crash the affected computer, denying service to legitimate users. Versions prior to Tor 0.2.2.39 and 0.2.3.22-rc are vulnerable. The title and technical details have been changed to better reflect the underlying component affected. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201301-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Tor: Multiple vulnerabilities Date: January 08, 2013 Bugs: #432188, #434882, #444804 ID: 201301-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Tor, allowing attackers to cause Denial of Service or obtain sensitive information. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/tor < 0.2.3.25 >= 0.2.3.25 Description =========== Multiple vulnerabilities have been discovered in Tor. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All Tor users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.3.25" References ========== [ 1 ] CVE-2012-3517 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3517 [ 2 ] CVE-2012-3518 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3518 [ 3 ] CVE-2012-3519 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3519 [ 4 ] CVE-2012-4419 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4419 [ 5 ] CVE-2012-4922 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4922 [ 6 ] CVE-2012-5573 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5573 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201301-03.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.61

sources: NVD: CVE-2012-4922 // JVNDB: JVNDB-2012-004416 // CNVD: CNVD-2012-7649 // BID: 55519 // VULMON: CVE-2012-4922 // PACKETSTORM: 119351

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2012-7649

AFFECTED PRODUCTS

vendor:torprojectmodel:torscope:eqversion:0.0.9.10

Trust: 1.6

vendor:torprojectmodel:torscope:eqversion:0.1.0.10

Trust: 1.6

vendor:torprojectmodel:torscope:eqversion:0.0.9.6

Trust: 1.6

vendor:torprojectmodel:torscope:eqversion:0.0.9.5

Trust: 1.6

vendor:torprojectmodel:torscope:eqversion:0.0.9.7

Trust: 1.6

vendor:torprojectmodel:torscope:eqversion:0.0.9.9

Trust: 1.6

vendor:torprojectmodel:torscope:eqversion:0.1.0.12

Trust: 1.6

vendor:torprojectmodel:torscope:eqversion:0.0.9.4

Trust: 1.6

vendor:torprojectmodel:torscope:eqversion:0.1.0.11

Trust: 1.6

vendor:torprojectmodel:torscope:eqversion:0.0.9.8

Trust: 1.6

vendor:torprojectmodel:torscope:eqversion:0.1.2.13

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.0.7.1

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.1.2.14

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.0.35

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.0.7.2

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.0.34

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.2.29

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.0.6.1

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.3.16

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.0.5

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.1.2.16

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.3.15

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.0.9.3

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.1.2.15

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.1.2.18

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.2.32

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.2.27

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.2.36

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.2.35

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.0.31

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.1.1.21

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.2.28

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.0.7.3

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.1.1.24

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.2.20

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.2.26

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.2.31

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.0.7

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.1.0.15

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.2.22

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.0.9.2

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.3.17

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.3

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.3.20

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.1.1.25

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.2.30

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.1.0.14

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.0.4

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.2.18

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.1.0.16

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.0.6

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.1.1.22

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.1.2.17

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.0.33

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.0.3

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.2.25

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.0.2

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.3.18

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.1.2.19

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.3.19

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.0.30

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.1.0.13

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.1.1.23

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.2.34

Trust: 1.0

vendor:torprojectmodel:torscope:lteversion:0.2.2.38

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.1.0.17

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.2.19

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.3.21

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.0.9.1

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.0.6.2

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.0.32

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.2.23

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.1.1.26

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.2.21

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.1.1.20

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.3.14

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.2.33

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.2.24

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.3.13

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.2.2.37

Trust: 1.0

vendor:torprojectmodel:torscope:eqversion:0.0.8.1

Trust: 1.0

vendor:the tormodel:torscope:ltversion:0.2.3.x

Trust: 0.8

vendor:the tormodel:torscope:eqversion:0.2.3.22-rc

Trust: 0.8

vendor:redmodel:hat fedorascope:eqversion:13

Trust: 0.6

sources: CNVD: CNVD-2012-7649 // JVNDB: JVNDB-2012-004416 // CNNVD: CNNVD-201209-319 // NVD: CVE-2012-4922

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-4922
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-4922
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2012-7649
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201209-319
value: MEDIUM

Trust: 0.6

VULMON: CVE-2012-4922
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-4922
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2012-7649
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2012-7649 // VULMON: CVE-2012-4922 // JVNDB: JVNDB-2012-004416 // CNNVD: CNNVD-201209-319 // NVD: CVE-2012-4922

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2012-004416 // NVD: CVE-2012-4922

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201209-319

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201209-319

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-004416

PATCH

title:openSUSE-SU-2012:1278url:http://lists.opensuse.org/opensuse-updates/2012-10/msg00005.html

Trust: 0.8

title:Fix assertion failure in tor_timegm.url:https://gitweb.torproject.org/tor.git/commit/973c18bf0e84d14d8006a9ae97fde7f7fb97e404

Trust: 0.8

title:[tor-talk] Tor 0.2.3.22-rc is outurl:https://lists.torproject.org/pipermail/tor-talk/2012-September/025501.html

Trust: 0.8

title:[tor.git] / ReleaseNotes (bump to 0.2.2.39)url:https://gitweb.torproject.org/tor.git/blob/release-0.2.2:/ReleaseNotes

Trust: 0.8

title:Ticket #6811url:https://trac.torproject.org/projects/tor/ticket/6811

Trust: 0.8

title:calligra-2.5.4url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=44847

Trust: 0.6

title:radamsa-Fuzzerurl:https://github.com/sunzu94/radamsa-Fuzzer

Trust: 0.1

title:RADAMSAurl:https://github.com/StephenHaruna/RADAMSA

Trust: 0.1

title:radamsaurl:https://github.com/Hwangtaewon/radamsa

Trust: 0.1

title:radamsaurl:https://github.com/benoit-a/radamsa

Trust: 0.1

sources: VULMON: CVE-2012-4922 // JVNDB: JVNDB-2012-004416 // CNNVD: CNNVD-201209-319

EXTERNAL IDS

db:NVDid:CVE-2012-4922

Trust: 2.9

db:OPENWALLid:OSS-SECURITY/2012/09/12/5

Trust: 1.7

db:BIDid:55519

Trust: 1.0

db:JVNDBid:JVNDB-2012-004416

Trust: 0.8

db:CNVDid:CNVD-2012-7649

Trust: 0.6

db:MLISTid:[TOR-TALK] 20120912 TOR 0.2.3.22-RC IS OUT

Trust: 0.6

db:MLISTid:[OSS-SECURITY] 20120912 CVE ID REQUEST: TOR

Trust: 0.6

db:CNNVDid:CNNVD-201209-319

Trust: 0.6

db:VULMONid:CVE-2012-4922

Trust: 0.1

db:PACKETSTORMid:119351

Trust: 0.1

sources: CNVD: CNVD-2012-7649 // VULMON: CVE-2012-4922 // BID: 55519 // JVNDB: JVNDB-2012-004416 // PACKETSTORM: 119351 // CNNVD: CNNVD-201209-319 // NVD: CVE-2012-4922

REFERENCES

url:https://trac.torproject.org/projects/tor/ticket/6811

Trust: 2.3

url:https://gitweb.torproject.org/tor.git/blob/release-0.2.2:/releasenotes

Trust: 2.0

url:https://lists.torproject.org/pipermail/tor-talk/2012-september/025501.html

Trust: 2.0

url:https://gitweb.torproject.org/tor.git/commit/973c18bf0e84d14d8006a9ae97fde7f7fb97e404

Trust: 1.7

url:http://openwall.com/lists/oss-security/2012/09/12/5

Trust: 1.7

url:http://security.gentoo.org/glsa/glsa-201301-03.xml

Trust: 1.2

url:http://lists.opensuse.org/opensuse-updates/2012-10/msg00005.html

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2012-september/088006.html

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4922

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4922

Trust: 0.8

url:http://www.securityfocus.com/bid/55519/info

Trust: 0.6

url:https://www.torproject.org/index.html.en

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.securityfocus.com/bid/55519

Trust: 0.1

url:https://github.com/sunzu94/radamsa-fuzzer

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4922

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3517

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3517

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5573

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3519

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4419

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3518

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3519

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4922

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3518

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5573

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4419

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

sources: CNVD: CNVD-2012-7649 // VULMON: CVE-2012-4922 // BID: 55519 // JVNDB: JVNDB-2012-004416 // PACKETSTORM: 119351 // CNNVD: CNNVD-201209-319 // NVD: CVE-2012-4922

CREDITS

Reported by the vendor

Trust: 0.3

sources: BID: 55519

SOURCES

db:CNVDid:CNVD-2012-7649
db:VULMONid:CVE-2012-4922
db:BIDid:55519
db:JVNDBid:JVNDB-2012-004416
db:PACKETSTORMid:119351
db:CNNVDid:CNNVD-201209-319
db:NVDid:CVE-2012-4922

LAST UPDATE DATE

2024-11-23T21:46:10.174000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-7649date:2012-09-12T00:00:00
db:VULMONid:CVE-2012-4922date:2013-08-22T00:00:00
db:BIDid:55519date:2015-04-13T20:56:00
db:JVNDBid:JVNDB-2012-004416date:2012-11-15T00:00:00
db:CNNVDid:CNNVD-201209-319date:2012-09-18T00:00:00
db:NVDid:CVE-2012-4922date:2024-11-21T01:43:45.397

SOURCES RELEASE DATE

db:CNVDid:CNVD-2012-7649date:2012-09-12T00:00:00
db:VULMONid:CVE-2012-4922date:2012-09-14T00:00:00
db:BIDid:55519date:2012-09-12T00:00:00
db:JVNDBid:JVNDB-2012-004416date:2012-09-19T00:00:00
db:PACKETSTORMid:119351date:2013-01-09T02:25:38
db:CNNVDid:CNNVD-201209-319date:2012-09-18T00:00:00
db:NVDid:CVE-2012-4922date:2012-09-14T18:55:04.980