VAR-201402-0035
Vulnerability from variot - Updated: 2025-04-11 22:48Tor before 0.2.3.23-rc allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a renegotiation attempt that occurs after the initiation of the V3 link protocol. Tor (The Onion Router) is an implementation of the second generation of onion routing, mainly used for anonymous access to the Internet. A denial of service vulnerability exists in versions prior to Tor 0.2.3.23-rc that could allow a remote attacker to compromise an affected application. The application is prone to a remote denial-of-service vulnerability. Attackers may exploit this issue to cause an affected application to crash, resulting in a denial-of-service condition. Versions prior to Tor 0.2.4.4-alpha are vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201402-0035",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "tor",
"scope": "eq",
"trust": 1.9,
"vendor": "torproject",
"version": "0.1.1.20"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.9,
"vendor": "torproject",
"version": "0.0.2"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.9,
"vendor": "torproject",
"version": "0.1.1.22"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.9,
"vendor": "torproject",
"version": "0.1.1.21"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.9,
"vendor": "torproject",
"version": "0.1.0.17"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.9,
"vendor": "torproject",
"version": "0.1.0.16"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.9,
"vendor": "torproject",
"version": "0.1.0.15"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.9.3"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.9.2"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.2.3"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.2.2.38"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.2.2.37"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.2.2.36"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.2.2.35"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.2.2.34"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.2.2.33"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.2.2.32"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.2.2.31"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.2.2.30"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.2.2.29"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.2.2.28"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.2.2.27"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.2.2.26"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.2.2.23"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.2.2.22"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.2.2.21"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.2.2.20"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.2.2.19"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.2.0.30"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.1.2.19"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.1.2.18"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.1.2.17"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.1.2.16"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.1.2.15"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.1.2.14"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.1.2.13"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.1.1.26"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.1.1.25"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.1.1.24"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.1.1.23"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.1.0.14"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.1.0.13"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.1.0.12"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.1.0.11"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.1.0.10"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.9.9"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.9.8"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.9.7"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.9.6"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.9.5"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.9.4"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.9.10"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.9.1"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.8.1"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.7.3"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.7.2"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.7.1"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.7"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.6.2"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.6.1"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.6"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.5"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.4"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.3,
"vendor": "torproject",
"version": "0.0.3"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.0,
"vendor": "torproject",
"version": "0.2.0.31"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.0,
"vendor": "torproject",
"version": "0.2.3.19"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.0,
"vendor": "torproject",
"version": "0.2.3.13"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.0,
"vendor": "torproject",
"version": "0.2.3.21"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.0,
"vendor": "torproject",
"version": "0.2.3.15"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.0,
"vendor": "torproject",
"version": "0.2.3.20"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.0,
"vendor": "torproject",
"version": "0.2.3.17"
},
{
"model": "tor",
"scope": "lte",
"trust": 1.0,
"vendor": "torproject",
"version": "0.2.3.22"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.0,
"vendor": "torproject",
"version": "0.2.2.24"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.0,
"vendor": "torproject",
"version": "0.2.0.34"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.0,
"vendor": "torproject",
"version": "0.2.3.16"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.0,
"vendor": "torproject",
"version": "0.2.0.32"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.0,
"vendor": "torproject",
"version": "0.2.2.25"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.0,
"vendor": "torproject",
"version": "0.2.0.33"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.0,
"vendor": "torproject",
"version": "0.2.3.18"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.0,
"vendor": "torproject",
"version": "0.2.0.35"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.0,
"vendor": "torproject",
"version": "0.2.3.14"
},
{
"model": "tor",
"scope": "eq",
"trust": 1.0,
"vendor": "torproject",
"version": "0.2.2.18"
},
{
"model": "tor",
"scope": "lt",
"trust": 0.8,
"vendor": "the tor",
"version": "0.2.3.23-rc"
},
{
"model": "tor \u003c0.2.3.24-rc",
"scope": null,
"trust": 0.6,
"vendor": "torproject",
"version": null
},
{
"model": "tor",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.225"
},
{
"model": "tor",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.224"
},
{
"model": "tor",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.35"
},
{
"model": "tor",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.34"
},
{
"model": "tor",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.33"
},
{
"model": "tor",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.32"
},
{
"model": "tor",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.31"
},
{
"model": "tor",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.4.19"
},
{
"model": "tor rc",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.3.24"
},
{
"model": "tor rc",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.3.23"
},
{
"model": "tor rc",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.3.22"
},
{
"model": "tor rc",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.3.21"
},
{
"model": "tor rc",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.3.20"
},
{
"model": "tor rc",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.3.19"
},
{
"model": "tor rc",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.3.18"
},
{
"model": "tor beta",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.3.17"
},
{
"model": "tor alpha",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.3.16"
},
{
"model": "tor alpha",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.3.15"
},
{
"model": "tor alpha",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.3.14"
},
{
"model": "tor alpha",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.3.13"
},
{
"model": "tor pre27",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.0.2"
},
{
"model": "tor pre26",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.0.2"
},
{
"model": "tor pre25",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.0.2"
},
{
"model": "tor pre24",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.0.2"
},
{
"model": "tor pre23",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.0.2"
},
{
"model": "tor pre22",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.0.2"
},
{
"model": "tor pre21",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.0.2"
},
{
"model": "tor pre20",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.0.2"
},
{
"model": "tor pre19",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.0.2"
},
{
"model": "tor pre18",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.0.2"
},
{
"model": "tor pre17",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.0.2"
},
{
"model": "tor pre16",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.0.2"
},
{
"model": "tor pre15",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.0.2"
},
{
"model": "tor pre14",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.0.2"
},
{
"model": "tor pre13",
"scope": "eq",
"trust": 0.3,
"vendor": "torproject",
"version": "0.0.2"
},
{
"model": "tor alpha",
"scope": "ne",
"trust": 0.3,
"vendor": "torproject",
"version": "0.2.4.4"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-00702"
},
{
"db": "BID",
"id": "65357"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006129"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-015"
},
{
"db": "NVD",
"id": "CVE-2012-2249"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:torproject:tor",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-006129"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "65357"
}
],
"trust": 0.3
},
"cve": "CVE-2012-2249",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2012-2249",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2014-00702",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2012-2249",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2012-2249",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2014-00702",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201402-015",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-00702"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006129"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-015"
},
{
"db": "NVD",
"id": "CVE-2012-2249"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Tor before 0.2.3.23-rc allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a renegotiation attempt that occurs after the initiation of the V3 link protocol. Tor (The Onion Router) is an implementation of the second generation of onion routing, mainly used for anonymous access to the Internet. A denial of service vulnerability exists in versions prior to Tor 0.2.3.23-rc that could allow a remote attacker to compromise an affected application. The application is prone to a remote denial-of-service vulnerability. \nAttackers may exploit this issue to cause an affected application to crash, resulting in a denial-of-service condition. \nVersions prior to Tor 0.2.4.4-alpha are vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2012-2249"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006129"
},
{
"db": "CNVD",
"id": "CNVD-2014-00702"
},
{
"db": "BID",
"id": "65357"
}
],
"trust": 2.43
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2012-2249",
"trust": 3.3
},
{
"db": "BID",
"id": "65357",
"trust": 0.9
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006129",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2014-00702",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201402-015",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-00702"
},
{
"db": "BID",
"id": "65357"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006129"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-015"
},
{
"db": "NVD",
"id": "CVE-2012-2249"
}
]
},
"id": "VAR-201402-0035",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-00702"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-00702"
}
]
},
"last_update_date": "2025-04-11T22:48:23.399000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Bug 1060758",
"trust": 0.8,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060758"
},
{
"title": "ChangeLog",
"trust": 0.8,
"url": "https://gitweb.torproject.org/tor.git?a=blob_plain;hb=HEAD;f=ChangeLog"
},
{
"title": "Patch for Tor Remote Denial of Service Vulnerability (CNVD-2014-00702)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/43279"
},
{
"title": "tor_0.2.3.23-rc.orig",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=47817"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-00702"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006129"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-015"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2012-2249"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.5,
"url": "https://gitweb.torproject.org/tor.git?a=blob_plain;hb=head;f=changelog"
},
{
"trust": 1.0,
"url": "https://gitweb.torproject.org/tor.git?a=blob_plain%3bhb=head%3bf=changelog"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2249"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2249"
},
{
"trust": 0.8,
"url": "http://debian.2.n7.nabble.com/bug-691499-unblock-tor-0-2-3-24-rc-1-td2788119.html"
},
{
"trust": 0.3,
"url": "https://www.torproject.org/index.html.en"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-00702"
},
{
"db": "BID",
"id": "65357"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006129"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-015"
},
{
"db": "NVD",
"id": "CVE-2012-2249"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2014-00702"
},
{
"db": "BID",
"id": "65357"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006129"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-015"
},
{
"db": "NVD",
"id": "CVE-2012-2249"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-02-11T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-00702"
},
{
"date": "2012-10-20T00:00:00",
"db": "BID",
"id": "65357"
},
{
"date": "2014-02-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-006129"
},
{
"date": "2014-02-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201402-015"
},
{
"date": "2014-02-03T03:55:03.627000",
"db": "NVD",
"id": "CVE-2012-2249"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-02-11T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-00702"
},
{
"date": "2012-10-20T00:00:00",
"db": "BID",
"id": "65357"
},
{
"date": "2014-02-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-006129"
},
{
"date": "2014-02-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201402-015"
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2012-2249"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201402-015"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Tor Service disruption in (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-006129"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201402-015"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…