Tor before 0.1.1.20 does not sufficiently obey certain firewall options, which allows remote attackers to bypass intended access restrictions for dirservers, direct connections, or proxy servers.
References
Link | Resource |
---|---|
http://secunia.com/advisories/20514 | Patch Vendor Advisory |
http://security.gentoo.org/glsa/glsa-200606-04.xml | Patch Vendor Advisory |
http://tor.eff.org/cvs/tor/ChangeLog | |
http://www.osvdb.org/25874 | |
http://secunia.com/advisories/20514 | Patch Vendor Advisory |
http://security.gentoo.org/glsa/glsa-200606-04.xml | Patch Vendor Advisory |
http://tor.eff.org/cvs/tor/ChangeLog | |
http://www.osvdb.org/25874 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/20514 - Patch, Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200606-04.xml - Patch, Vendor Advisory | |
References | () http://tor.eff.org/cvs/tor/ChangeLog - | |
References | () http://www.osvdb.org/25874 - |
Information
Published : 2006-07-07 00:05
Updated : 2024-11-21 00:13
NVD link : CVE-2006-3412
Mitre link : CVE-2006-3412
CVE.ORG link : CVE-2006-3412
JSON object : View
Products Affected
tor
- tor
CWE