[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #5402 [Tor Client]: #5090 allows post-auth heap overflow



#5402: #5090 allows post-auth heap overflow
------------------------+---------------------------------------------------
 Reporter:  arma        |          Owner:                    
     Type:  defect      |         Status:  new               
 Priority:  major       |      Milestone:  Tor: 0.2.2.x-final
Component:  Tor Client  |        Version:                    
 Keywords:              |         Parent:                    
   Points:              |   Actualpoints:                    
------------------------+---------------------------------------------------

Comment(by nickm):

 Replying to [ticket:5402 arma]:
 > Fortunately, it looks like it can only be triggered once you've
 authenticated to the control port (in which case you can already screw the
 user) or if you can edit the torrc file (same). So it's not harmful.

 This line of reasoning is mostly true, but there are exceptions.  For
 example, suppose that somebody has made a custom-built controller or
 torrc-generator program that accepts potentially hostile input but doesn't
 escape it correctly before passing it to Tor.  I don't know of any such
 programs in use, but if there are, that would be one way to exploit this.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5402#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs