{"id":"CVE-2011-2778","details":"Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration.","modified":"2026-04-10T03:41:53.116485Z","published":"2011-12-23T03:59:22Z","related":["openSUSE-SU-2024:10423-1"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2011/dsa-2363"},{"type":"ADVISORY","url":"https://blog.torproject.org/blog/tor-02235-released-security-patches"},{"type":"FIX","url":"https://blog.torproject.org/blog/tor-02235-released-security-patches"}],"schema_version":"1.7.5"}