Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-updates/2014-01/msg00095.html - | |
References | () https://lists.torproject.org/pipermail/tor-talk/2013-December/031483.html - Vendor Advisory |
Information
Published : 2014-01-17 21:55
Updated : 2024-11-21 02:00
NVD link : CVE-2013-7295
Mitre link : CVE-2013-7295
CVE.ORG link : CVE-2013-7295
JSON object : View
Products Affected
torproject
- tor
CWE
CWE-310
Cryptographic Issues