Vulnerability: Security Bypass in Tor
Number of vulnerabilities: 1
Vector operation: Remote
Impact: Security Bypass
Exploit: PoC code
Affected products: Tor Browser Bundle for Windows 2.x
Affected versions: Tor 2.2.39-5, possibly other versions
Which can be exploited by malicious people to disclose sensitive data on the target system.
An error status of the operation in a function call memset (), which may be removed by the compiler. This can be exploited to disclose the contents of the buffer to the client Tor
Manufacturer URL: https://www.torproject.org/
Solution: The way to eliminate the vulnerability does not exist at present.