ID CVE-2006-0414
Summary Tor before 0.1.1.20 allows remote attackers to identify hidden services via a malicious Tor server that attempts a large number of accesses of the hidden service, which eventually causes a circuit to be built through the malicious server.
References
Vulnerable Configurations
  • cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*
  • cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*
    cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 20-07-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bid
  • 18323
  • 19795
confirm
gentoo GLSA-200606-04
osvdb 22689
secunia
  • 18576
  • 20514
xf tor-service-information-disclosure(24285)
Last major update 20-07-2017 - 01:29
Published 25-01-2006 - 11:03
Last modified 20-07-2017 - 01:29
Back to Top