Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon,  6 Apr 2015 16:07:00 -0400 (EDT)
Subject: Re: CVE Request: tor: new upstream releases (, and fixing security issues

Hash: SHA1

>>   o Major bugfixes (security, hidden service):
>>     - Fix an issue that would allow a malicious client to trigger an
>>       assertion failure and halt a hidden service. Fixes bug 15600;
>>       bugfix on Reported by "disgleirio".

Use CVE-2015-2928.

>>     - Fix a bug that could cause a client to crash with an assertion
>>       failure when parsing a malformed hidden service descriptor. Fixes
>>       bug 15601; bugfix on Found by "DonnchaC".

Use CVE-2015-2929.

>>   This release also contains two simple improvements to make hidden
>>   services a bit less vulnerable to denial-of-service attacks.

>>   o Minor features (DoS-resistance, hidden service):
>>     - Introduction points no longer allow multiple INTRODUCE1 cells to
>>       arrive on the same circuit. This should make it more expensive for
>>       attackers to overwhelm hidden services with introductions.
>>       Resolves ticket 15515.
>>     - Decrease the amount of reattempts that a hidden service performs
>>       when its rendezvous circuits fail. This reduces the computational
>>       cost for running a hidden service under heavy load. Resolves
>>       ticket 11447.

There are no CVE IDs for these issues. Typically a CVE ID is not
assigned for an issue that the software's author describes as an
"improvement." In each case, the "bit less vulnerable to
denial-of-service attacks" is apparently a tradeoff against something
else, such as robustness during times when no flooding attack is
underway. In the first case, possibly a legitimate client cannot make
use of the first INTRODUCE1 cell and therefore sends another one
intentionally. In the second case, maybe the rendezvous circuits are
failing because of physical problems with the network, and more
reattempts would have been helpful.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through ]
Version: GnuPG v1.4.14 (SunOS)


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.