Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit.
References
Link | Resource |
---|---|
http://archives.seul.org/or/announce/Aug-2005/msg00002.html | Vendor Advisory |
http://marc.info/?l=bugtraq&m=112448002732443&w=2 | |
http://secunia.com/advisories/16424 | Patch Vendor Advisory |
http://securitytracker.com/id?1014739 | |
http://archives.seul.org/or/announce/Aug-2005/msg00002.html | Vendor Advisory |
http://marc.info/?l=bugtraq&m=112448002732443&w=2 | |
http://secunia.com/advisories/16424 | Patch Vendor Advisory |
http://securitytracker.com/id?1014739 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.seul.org/or/announce/Aug-2005/msg00002.html - Vendor Advisory | |
References | () http://marc.info/?l=bugtraq&m=112448002732443&w=2 - | |
References | () http://secunia.com/advisories/16424 - Patch, Vendor Advisory | |
References | () http://securitytracker.com/id?1014739 - |
Information
Published : 2005-08-23 04:00
Updated : 2024-11-21 00:00
NVD link : CVE-2005-2643
Mitre link : CVE-2005-2643
CVE.ORG link : CVE-2005-2643
JSON object : View
Products Affected
tor
- tor
CWE