Nick Mathewson

5 exploits Active since Jan 2017
CVE-2016-10195 WRITEUP CRITICAL WRITEUP
Libevent < 2.1.5 - Out-of-Bounds Read
The name_parse function in evdns.c in libevent before 2.1.6-beta allows remote attackers to have unspecified impact via vectors involving the label_len variable, which triggers an out-of-bounds stack read.
CVSS 9.8
CVE-2016-10196 WRITEUP HIGH WRITEUP
Debian Linux < 2.1.5 - Out-of-Bounds Write
Stack-based buffer overflow in the evutil_parse_sockaddr_port function in evutil.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (segmentation fault) via vectors involving a long string in brackets in the ip_as_string argument.
CVSS 7.5
CVE-2016-8860 WRITEUP HIGH WRITEUP
Tor <0.2.8.9 and 0.2.9.x <0.2.9.4-alpha - DoS
Tor before 0.2.8.9 and 0.2.9.x before 0.2.9.4-alpha had internal functions that were entitled to expect that buf_t data had NUL termination, but the implementation of or/buffers.c did not ensure that NUL termination was present, which allows remote attackers to cause a denial of service (client, hidden service, relay, or authority crash) via crafted data.
CVSS 7.5
CVE-2017-0377 WRITEUP HIGH WRITEUP
Tor - Information Disclosure
Tor 0.3.x before 0.3.0.9 has a guard-selection algorithm that only considers the exit relay (not the exit relay's family), which might allow remote attackers to defeat intended anonymity properties by leveraging the existence of large families.
CVSS 7.5
CVE-2017-0380 WRITEUP MEDIUM WRITEUP
Tor < 0.2.8.14 - Log Information Exposure
The rend_service_intro_established function in or/rendservice.c in Tor before 0.2.8.15, 0.2.9.x before 0.2.9.12, 0.3.0.x before 0.3.0.11, 0.3.1.x before 0.3.1.7, and 0.3.2.x before 0.3.2.1-alpha, when SafeLogging is disabled, allows attackers to obtain sensitive information by leveraging access to the log files of a hidden service, because uninitialized stack data is included in an error message about construction of an introduction point circuit.
CVSS 5.9