Vulnerabilites related to tor - tor
CVE-2006-3419 (GCVE-0-2006-3419)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/25880 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/20514 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200606-04.xml | vendor-advisory, x_refsource_GENTOO | |
http://tor.eff.org/cvs/tor/ChangeLog | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:33.376Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25880", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25880" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-07-07T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25880", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25880" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3419", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25880", "refsource": "OSVDB", "url": "http://www.osvdb.org/25880" }, { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3419", "datePublished": "2006-07-07T00:00:00Z", "dateReserved": "2006-07-06T00:00:00Z", "dateUpdated": "2024-09-17T00:51:25.809Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-1103 (GCVE-0-2007-1103)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://archives.seul.org/or/talk/Feb-2007/msg00197.html | mailing-list, x_refsource_MLIST | |
http://archives.seul.org/or/talk/Feb-2007/msg00202.html | mailing-list, x_refsource_MLIST | |
http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf | x_refsource_MISC | |
http://archives.seul.org/or/talk/Feb-2007/msg00200.html | mailing-list, x_refsource_MLIST | |
http://osvdb.org/45249 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:43:22.579Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[or-talk] 20070225 \"Low-Resource Routing Attacks Against Anonymous Systems\"", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/talk/Feb-2007/msg00197.html" }, { "name": "[or-talk] 20070225 Re: ISP controlling entry/exti (\"Low-Resource Routing Attacks Against Anonymous Systems\")", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/talk/Feb-2007/msg00202.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf" }, { "name": "[or-talk] 20070225 Re: \"Low-Resource Routing Attacks Against Anonymous Systems\"", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/talk/Feb-2007/msg00200.html" }, { "name": "45249", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/45249" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-02-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor does not verify a node\u0027s uptime and bandwidth advertisements, which allows remote attackers who operate a low resource node to make false claims of greater resources, which places the node into use for many circuits and compromises the anonymity of traffic sources and destinations." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-15T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[or-talk] 20070225 \"Low-Resource Routing Attacks Against Anonymous Systems\"", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/talk/Feb-2007/msg00197.html" }, { "name": "[or-talk] 20070225 Re: ISP controlling entry/exti (\"Low-Resource Routing Attacks Against Anonymous Systems\")", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/talk/Feb-2007/msg00202.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf" }, { "name": "[or-talk] 20070225 Re: \"Low-Resource Routing Attacks Against Anonymous Systems\"", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/talk/Feb-2007/msg00200.html" }, { "name": "45249", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/45249" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1103", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor does not verify a node\u0027s uptime and bandwidth advertisements, which allows remote attackers who operate a low resource node to make false claims of greater resources, which places the node into use for many circuits and compromises the anonymity of traffic sources and destinations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[or-talk] 20070225 \"Low-Resource Routing Attacks Against Anonymous Systems\"", "refsource": "MLIST", "url": "http://archives.seul.org/or/talk/Feb-2007/msg00197.html" }, { "name": "[or-talk] 20070225 Re: ISP controlling entry/exti (\"Low-Resource Routing Attacks Against Anonymous Systems\")", "refsource": "MLIST", "url": "http://archives.seul.org/or/talk/Feb-2007/msg00202.html" }, { "name": "http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf", "refsource": "MISC", "url": "http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf" }, { "name": "[or-talk] 20070225 Re: \"Low-Resource Routing Attacks Against Anonymous Systems\"", "refsource": "MLIST", "url": "http://archives.seul.org/or/talk/Feb-2007/msg00200.html" }, { "name": "45249", "refsource": "OSVDB", "url": "http://osvdb.org/45249" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1103", "datePublished": "2007-02-26T17:00:00", "dateReserved": "2007-02-26T00:00:00", "dateUpdated": "2024-08-07T12:43:22.579Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-0938 (GCVE-0-2009-0938)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/34583 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49323 | vdb-entry, x_refsource_XF | |
http://archives.seul.org/or/announce/Feb-2009/msg00000.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/33880 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/33713 | vdb-entry, x_refsource_BID | |
http://security.gentoo.org/glsa/glsa-200904-11.xml | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:57:16.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34583" }, { "name": "tor-mirrors-dos(49323)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49323" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service (exit node crash) via \"malformed input.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34583" }, { "name": "tor-mirrors-dos(49323)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49323" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0938", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service (exit node crash) via \"malformed input.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34583", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34583" }, { "name": "tor-mirrors-dos(49323)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49323" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "refsource": "BID", "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-0938", "datePublished": "2009-03-18T01:00:00", "dateReserved": "2009-03-17T00:00:00", "dateUpdated": "2024-08-07T04:57:16.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3414 (GCVE-0-2006-3414)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/20514 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200606-04.xml | vendor-advisory, x_refsource_GENTOO | |
http://tor.eff.org/cvs/tor/ChangeLog | x_refsource_CONFIRM | |
http://www.osvdb.org/25877 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "25877", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25877" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 supports server descriptors that contain hostnames instead of IP addresses, which allows remote attackers to arbitrarily group users by providing preferential address resolution." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-07-07T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "25877", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25877" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3414", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.1.20 supports server descriptors that contain hostnames instead of IP addresses, which allows remote attackers to arbitrarily group users by providing preferential address resolution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "25877", "refsource": "OSVDB", "url": "http://www.osvdb.org/25877" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3414", "datePublished": "2006-07-07T00:00:00Z", "dateReserved": "2006-07-06T00:00:00Z", "dateUpdated": "2024-09-16T23:55:56.346Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3411 (GCVE-0-2006-3411)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/25876 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/20514 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200606-04.xml | vendor-advisory, x_refsource_GENTOO | |
http://tor.eff.org/cvs/tor/ChangeLog | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.886Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25876", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25876" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-07-07T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25876", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25876" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3411", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25876", "refsource": "OSVDB", "url": "http://www.osvdb.org/25876" }, { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3411", "datePublished": "2006-07-07T00:00:00Z", "dateReserved": "2006-07-06T00:00:00Z", "dateUpdated": "2024-09-16T21:02:25.720Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0015 (GCVE-0-2011-0015)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://archives.seul.org/or/announce/Jan-2011/msg00000.html | mailing-list, x_refsource_MLIST | |
http://www.vupen.com/english/advisories/2011/0131 | vdb-entry, x_refsource_VUPEN | |
https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog | x_refsource_CONFIRM | |
https://trac.torproject.org/projects/tor/ticket/2324 | x_refsource_CONFIRM | |
http://secunia.com/advisories/42907 | third-party-advisory, x_refsource_SECUNIA | |
http://blog.torproject.org/blog/tor-02129-released-security-patches | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1024980 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2011/0132 | vdb-entry, x_refsource_VUPEN | |
http://www.debian.org/security/2011/dsa-2148 | vendor-advisory, x_refsource_DEBIAN | |
http://secunia.com/advisories/42905 | third-party-advisory, x_refsource_SECUNIA | |
http://www.openwall.com/lists/oss-security/2011/01/18/7 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/45832 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:36:02.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "ADV-2011-0131", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://trac.torproject.org/projects/tor/ticket/2324" }, { "name": "42907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42907" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "1024980", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024980" }, { "name": "ADV-2011-0132", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "name": "DSA-2148", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2148" }, { "name": "42905", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42905" }, { "name": "[oss-security] 20110118 Re: CVE request: tor", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/01/18/7" }, { "name": "45832", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45832" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly check the amount of compression in zlib-compressed data, which allows remote attackers to cause a denial of service via a large compression factor." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-01-22T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "ADV-2011-0131", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://trac.torproject.org/projects/tor/ticket/2324" }, { "name": "42907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42907" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "1024980", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024980" }, { "name": "ADV-2011-0132", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "name": "DSA-2148", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2148" }, { "name": "42905", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42905" }, { "name": "[oss-security] 20110118 Re: CVE request: tor", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/01/18/7" }, { "name": "45832", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45832" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-0015", "datePublished": "2011-01-19T11:00:00", "dateReserved": "2010-12-07T00:00:00", "dateUpdated": "2024-08-06T21:36:02.354Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-4894 (GCVE-0-2011-4894)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://blog.torproject.org/blog/tor-02234-released-security-patches | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:16:35.161Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.34, when configured as a bridge, uses direct DirPort access instead of a Tor TLS connection for a directory fetch, which makes it easier for remote attackers to enumerate bridges by observing DirPort connections." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-12-23T02:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-4894", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.2.34, when configured as a bridge, uses direct DirPort access instead of a Tor TLS connection for a directory fetch, which makes it easier for remote attackers to enumerate bridges by observing DirPort connections." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.torproject.org/blog/tor-02234-released-security-patches", "refsource": "CONFIRM", "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-4894", "datePublished": "2011-12-23T02:00:00Z", "dateReserved": "2011-12-22T00:00:00Z", "dateUpdated": "2024-09-16T20:48:21.454Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0385 (GCVE-0-2010-0385)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/37901 | vdb-entry, x_refsource_BID | |
http://www.osvdb.org/61865 | vdb-entry, x_refsource_OSVDB | |
http://archives.seul.org/or/announce/Jan-2010/msg00000.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/38198 | third-party-advisory, x_refsource_SECUNIA | |
http://archives.seul.org/or/talk/Jan-2010/msg00162.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:45:12.159Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "37901", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37901" }, { "name": "61865", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/61865" }, { "name": "[or-announce] 20100121 Tor 0.2.1.22 is released (security fix)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2010/msg00000.html" }, { "name": "38198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38198" }, { "name": "[or-talk] 20100120 Tor 0.2.2.7-alpha is out", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, when functioning as a bridge directory authority, allows remote attackers to obtain sensitive information about bridge identities and bridge descriptors via a dbg-stability.txt directory query." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-01-25T19:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "37901", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37901" }, { "name": "61865", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/61865" }, { "name": "[or-announce] 20100121 Tor 0.2.1.22 is released (security fix)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jan-2010/msg00000.html" }, { "name": "38198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38198" }, { "name": "[or-talk] 20100120 Tor 0.2.2.7-alpha is out", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-0385", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, when functioning as a bridge directory authority, allows remote attackers to obtain sensitive information about bridge identities and bridge descriptors via a dbg-stability.txt directory query." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "37901", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37901" }, { "name": "61865", "refsource": "OSVDB", "url": "http://www.osvdb.org/61865" }, { "name": "[or-announce] 20100121 Tor 0.2.1.22 is released (security fix)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jan-2010/msg00000.html" }, { "name": "38198", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38198" }, { "name": "[or-talk] 20100120 Tor 0.2.2.7-alpha is out", "refsource": "MLIST", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-0385", "datePublished": "2010-01-25T19:00:00Z", "dateReserved": "2010-01-25T00:00:00Z", "dateUpdated": "2024-09-16T17:22:56.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2768 (GCVE-0-2011-2768)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://blog.torproject.org/blog/tor-02234-released-security-patches | x_refsource_CONFIRM | |
http://www.debian.org/security/2011/dsa-2331 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:15:30.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "name": "DSA-2331", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-10-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-01-19T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "name": "DSA-2331", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-2768", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.torproject.org/blog/tor-02234-released-security-patches", "refsource": "CONFIRM", "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "name": "DSA-2331", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2331" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-2768", "datePublished": "2011-12-23T02:00:00", "dateReserved": "2011-07-19T00:00:00", "dateUpdated": "2024-08-06T23:15:30.714Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-6893 (GCVE-0-2006-6893)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html | x_refsource_MISC | |
http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-services-by-their-clock-skew/ | x_refsource_MISC | |
http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:42:07.539Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-services-by-their-clock-skew/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor allows remote attackers to discover the IP address of a hidden service by accessing this service at a high rate, thereby changing the server\u0027s CPU temperature and consequently changing the pattern of time values visible through (1) ICMP timestamps, (2) TCP sequence numbers, and (3) TCP timestamps, a different vulnerability than CVE-2006-0414. NOTE: it could be argued that this is a laws-of-physics vulnerability that is a fundamental design limitation of certain hardware implementations, so perhaps this issue should not be included in CVE." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-01-08T20:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-services-by-their-clock-skew/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-6893", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor allows remote attackers to discover the IP address of a hidden service by accessing this service at a high rate, thereby changing the server\u0027s CPU temperature and consequently changing the pattern of time values visible through (1) ICMP timestamps, (2) TCP sequence numbers, and (3) TCP timestamps, a different vulnerability than CVE-2006-0414. NOTE: it could be argued that this is a laws-of-physics vulnerability that is a fundamental design limitation of certain hardware implementations, so perhaps this issue should not be included in CVE." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html", "refsource": "MISC", "url": "http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html" }, { "name": "http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-services-by-their-clock-skew/", "refsource": "MISC", "url": "http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-services-by-their-clock-skew/" }, { "name": "http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf", "refsource": "MISC", "url": "http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-6893", "datePublished": "2007-01-08T20:00:00Z", "dateReserved": "2007-01-08T00:00:00Z", "dateUpdated": "2024-09-17T04:24:29.119Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-4508 (GCVE-0-2006-4508)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/21725 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/19785 | vdb-entry, x_refsource_BID | |
http://www.scatterchat.com/advisories/2006-02_tech.html | x_refsource_CONFIRM | |
http://archives.seul.org/or/announce/Aug-2006/msg00001.html | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/28686 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/21708 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:14:47.330Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "21725", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21725" }, { "name": "19785", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19785" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.scatterchat.com/advisories/2006-02_tech.html" }, { "name": "[or-announce] 20060829 Tor security advisory: clients will route traffic", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Aug-2006/msg00001.html" }, { "name": "tor-trafficrouting-dos(28686)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28686" }, { "name": "21708", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21708" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-08-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in (1) Tor 0.1.0.x before 0.1.0.18 and 0.1.1.x before 0.1.1.23, and (2) ScatterChat before 1.0.2, allows remote attackers operating a Tor entry node to route arbitrary Tor traffic through clients or cause a denial of service (flood) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "21725", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21725" }, { "name": "19785", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19785" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.scatterchat.com/advisories/2006-02_tech.html" }, { "name": "[or-announce] 20060829 Tor security advisory: clients will route traffic", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Aug-2006/msg00001.html" }, { "name": "tor-trafficrouting-dos(28686)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28686" }, { "name": "21708", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21708" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4508", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in (1) Tor 0.1.0.x before 0.1.0.18 and 0.1.1.x before 0.1.1.23, and (2) ScatterChat before 1.0.2, allows remote attackers operating a Tor entry node to route arbitrary Tor traffic through clients or cause a denial of service (flood) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "21725", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21725" }, { "name": "19785", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19785" }, { "name": "http://www.scatterchat.com/advisories/2006-02_tech.html", "refsource": "CONFIRM", "url": "http://www.scatterchat.com/advisories/2006-02_tech.html" }, { "name": "[or-announce] 20060829 Tor security advisory: clients will route traffic", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Aug-2006/msg00001.html" }, { "name": "tor-trafficrouting-dos(28686)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28686" }, { "name": "21708", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21708" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4508", "datePublished": "2006-08-31T23:00:00", "dateReserved": "2006-08-31T00:00:00", "dateUpdated": "2024-08-07T19:14:47.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-4096 (GCVE-0-2007-4096)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://osvdb.org/46968 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/25035 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/26140 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2007/2634 | vdb-entry, x_refsource_VUPEN | |
http://archives.seul.org/or/announce/Jul-2007/msg00000.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:46:39.267Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46968", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/46968" }, { "name": "25035", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26140" }, { "name": "ADV-2007-2634", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Tor before 0.1.2.15, when using BSD natd support, allows remote attackers to cause a denial of service via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-15T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "46968", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/46968" }, { "name": "25035", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26140" }, { "name": "ADV-2007-2634", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4096", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Tor before 0.1.2.15, when using BSD natd support, allows remote attackers to cause a denial of service via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46968", "refsource": "OSVDB", "url": "http://osvdb.org/46968" }, { "name": "25035", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26140" }, { "name": "ADV-2007-2634", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4096", "datePublished": "2007-07-30T21:00:00", "dateReserved": "2007-07-30T00:00:00", "dateUpdated": "2024-08-07T14:46:39.267Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3407 (GCVE-0-2006-3407)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/19795 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/20277 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/20514 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200606-04.xml | vendor-advisory, x_refsource_GENTOO | |
http://tor.eff.org/cvs/tor/ChangeLog | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26793 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.907Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "19795", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19795" }, { "name": "20277", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20277" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "tor-log-spoofing(26793)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26793" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-05-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 allows remote attackers to spoof log entries or possibly execute shell code via strings with non-printable characters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "19795", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19795" }, { "name": "20277", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20277" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "tor-log-spoofing(26793)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26793" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3407", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.1.20 allows remote attackers to spoof log entries or possibly execute shell code via strings with non-printable characters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "19795", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19795" }, { "name": "20277", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20277" }, { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "tor-log-spoofing(26793)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26793" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3407", "datePublished": "2006-07-07T00:00:00", "dateReserved": "2006-07-06T00:00:00", "dateUpdated": "2024-08-07T18:30:32.907Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3409 (GCVE-0-2006-3409)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/20277 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/18323 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/20514 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200606-04.xml | vendor-advisory, x_refsource_GENTOO | |
http://tor.eff.org/cvs/tor/ChangeLog | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26795 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.902Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20277", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20277" }, { "name": "18323", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/18323" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "tor-smartlists-bo(26795)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26795" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-05-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in Tor before 0.1.1.20 allows remote attackers to execute arbitrary code via crafted large inputs, which result in a buffer overflow when elements are added to smartlists." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20277", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20277" }, { "name": "18323", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/18323" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "tor-smartlists-bo(26795)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26795" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3409", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in Tor before 0.1.1.20 allows remote attackers to execute arbitrary code via crafted large inputs, which result in a buffer overflow when elements are added to smartlists." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20277", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20277" }, { "name": "18323", "refsource": "BID", "url": "http://www.securityfocus.com/bid/18323" }, { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "tor-smartlists-bo(26795)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26795" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3409", "datePublished": "2006-07-07T00:00:00", "dateReserved": "2006-07-06T00:00:00", "dateUpdated": "2024-08-07T18:30:32.902Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0384 (GCVE-0-2010-0384)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://archives.seul.org/or/talk/Jan-2010/msg00162.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:45:12.143Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[or-talk] 20100120 Tor 0.2.2.7-alpha is out", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor 0.2.2.x before 0.2.2.7-alpha, when functioning as a directory mirror, does not prevent logging of the client IP address upon detection of erroneous client behavior, which might make it easier for local users to discover the identities of clients in opportunistic circumstances by reading log files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-01-25T19:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[or-talk] 20100120 Tor 0.2.2.7-alpha is out", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-0384", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor 0.2.2.x before 0.2.2.7-alpha, when functioning as a directory mirror, does not prevent logging of the client IP address upon detection of erroneous client behavior, which might make it easier for local users to discover the identities of clients in opportunistic circumstances by reading log files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[or-talk] 20100120 Tor 0.2.2.7-alpha is out", "refsource": "MLIST", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-0384", "datePublished": "2010-01-25T19:00:00Z", "dateReserved": "2010-01-25T00:00:00Z", "dateUpdated": "2024-09-17T00:15:38.157Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3417 (GCVE-0-2006-3417)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/25879 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/20514 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200606-04.xml | vendor-advisory, x_refsource_GENTOO | |
http://tor.eff.org/cvs/tor/ChangeLog | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.807Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25879", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25879" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor client before 0.1.1.20 prefers entry points based on is_fast or is_stable flags, which could allow remote attackers to be preferred over nodes that are identified as more trustworthy \"entry guard\" (is_guard) systems by directory authorities." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-07-07T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25879", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25879" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3417", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor client before 0.1.1.20 prefers entry points based on is_fast or is_stable flags, which could allow remote attackers to be preferred over nodes that are identified as more trustworthy \"entry guard\" (is_guard) systems by directory authorities." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25879", "refsource": "OSVDB", "url": "http://www.osvdb.org/25879" }, { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3417", "datePublished": "2006-07-07T00:00:00Z", "dateReserved": "2006-07-06T00:00:00Z", "dateUpdated": "2024-09-17T03:49:22.492Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1676 (GCVE-0-2010-1676)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:35:53.702Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-02128-released-security-patches" }, { "name": "42667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42667" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-02220-alpha-out-security-patches" }, { "name": "1024910", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1024910" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog" }, { "name": "ADV-2011-0114", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0114" }, { "name": "[or-announce] 20101220 Tor 0.2.1.28 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Dec-2010/msg00000.html" }, { "name": "ADV-2010-3290", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3290" }, { "name": "GLSA-201101-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201101-02.xml" }, { "name": "45500", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45500" }, { "name": "42916", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42916" }, { "name": "42783", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42783" }, { "name": "42536", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42536" }, { "name": "FEDORA-2010-19159", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052657.html" }, { "name": "DSA-2136", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2136" }, { "name": "FEDORA-2010-19147", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052690.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-01-12T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-02128-released-security-patches" }, { "name": "42667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42667" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-02220-alpha-out-security-patches" }, { "name": "1024910", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1024910" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog" }, { "name": "ADV-2011-0114", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0114" }, { "name": "[or-announce] 20101220 Tor 0.2.1.28 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Dec-2010/msg00000.html" }, { "name": "ADV-2010-3290", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3290" }, { "name": "GLSA-201101-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201101-02.xml" }, { "name": "45500", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45500" }, { "name": "42916", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42916" }, { "name": "42783", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42783" }, { "name": "42536", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42536" }, { "name": "FEDORA-2010-19159", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052657.html" }, { "name": "DSA-2136", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2136" }, { "name": "FEDORA-2010-19147", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052690.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1676", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://blog.torproject.org/blog/tor-02128-released-security-patches", "refsource": "CONFIRM", "url": "http://blog.torproject.org/blog/tor-02128-released-security-patches" }, { "name": "42667", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42667" }, { "name": "http://blog.torproject.org/blog/tor-02220-alpha-out-security-patches", "refsource": "CONFIRM", "url": "http://blog.torproject.org/blog/tor-02220-alpha-out-security-patches" }, { "name": "1024910", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1024910" }, { "name": "https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog" }, { "name": "ADV-2011-0114", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0114" }, { "name": "[or-announce] 20101220 Tor 0.2.1.28 is released (security patches)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Dec-2010/msg00000.html" }, { "name": "ADV-2010-3290", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3290" }, { "name": "GLSA-201101-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201101-02.xml" }, { "name": "45500", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45500" }, { "name": "42916", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42916" }, { "name": "42783", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42783" }, { "name": "42536", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42536" }, { "name": "FEDORA-2010-19159", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052657.html" }, { "name": "DSA-2136", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2010/dsa-2136" }, { "name": "FEDORA-2010-19147", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052690.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-1676", "datePublished": "2010-12-22T00:00:00", "dateReserved": "2010-04-30T00:00:00", "dateUpdated": "2024-08-07T01:35:53.702Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0427 (GCVE-0-2011-0427)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://archives.seul.org/or/announce/Jan-2011/msg00000.html | mailing-list, x_refsource_MLIST | |
http://www.vupen.com/english/advisories/2011/0131 | vdb-entry, x_refsource_VUPEN | |
https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog | x_refsource_CONFIRM | |
http://secunia.com/advisories/42907 | third-party-advisory, x_refsource_SECUNIA | |
http://blog.torproject.org/blog/tor-02129-released-security-patches | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1024980 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/64748 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2011/0132 | vdb-entry, x_refsource_VUPEN | |
http://www.debian.org/security/2011/dsa-2148 | vendor-advisory, x_refsource_DEBIAN | |
http://secunia.com/advisories/42905 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/45832 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.937Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "ADV-2011-0131", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "name": "42907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42907" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "1024980", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024980" }, { "name": "tor-unspec-bo(64748)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64748" }, { "name": "ADV-2011-0132", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "name": "DSA-2148", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2148" }, { "name": "42905", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42905" }, { "name": "45832", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45832" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "ADV-2011-0131", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "name": "42907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42907" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "1024980", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024980" }, { "name": "tor-unspec-bo(64748)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64748" }, { "name": "ADV-2011-0132", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "name": "DSA-2148", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2148" }, { "name": "42905", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42905" }, { "name": "45832", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45832" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0427", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "ADV-2011-0131", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "name": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "name": "42907", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42907" }, { "name": "http://blog.torproject.org/blog/tor-02129-released-security-patches", "refsource": "CONFIRM", "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "1024980", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024980" }, { "name": "tor-unspec-bo(64748)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64748" }, { "name": "ADV-2011-0132", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "name": "DSA-2148", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2148" }, { "name": "42905", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42905" }, { "name": "45832", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45832" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0427", "datePublished": "2011-01-19T11:00:00", "dateReserved": "2011-01-12T00:00:00", "dateUpdated": "2024-08-06T21:51:08.937Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-5397 (GCVE-0-2008-5397)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/34583 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/32648 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/33025 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2008/3366 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47101 | vdb-entry, x_refsource_XF | |
http://blog.torproject.org/blog/tor-0.2.0.32-released | x_refsource_CONFIRM | |
http://security.gentoo.org/glsa/glsa-200904-11.xml | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:49:12.620Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34583" }, { "name": "32648", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32648" }, { "name": "33025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33025" }, { "name": "ADV-2008-3366", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3366" }, { "name": "tor-user-privilege-escalation(47101)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47101" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-0.2.0.32-released" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.0.32 does not properly process the (1) User and (2) Group configuration options, which might allow local users to gain privileges by leveraging unintended supplementary group memberships of the Tor process." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34583" }, { "name": "32648", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32648" }, { "name": "33025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33025" }, { "name": "ADV-2008-3366", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3366" }, { "name": "tor-user-privilege-escalation(47101)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47101" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-0.2.0.32-released" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5397", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.0.32 does not properly process the (1) User and (2) Group configuration options, which might allow local users to gain privileges by leveraging unintended supplementary group memberships of the Tor process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34583", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34583" }, { "name": "32648", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32648" }, { "name": "33025", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33025" }, { "name": "ADV-2008-3366", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/3366" }, { "name": "tor-user-privilege-escalation(47101)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47101" }, { "name": "http://blog.torproject.org/blog/tor-0.2.0.32-released", "refsource": "CONFIRM", "url": "http://blog.torproject.org/blog/tor-0.2.0.32-released" }, { "name": "GLSA-200904-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5397", "datePublished": "2008-12-09T00:00:00", "dateReserved": "2008-12-08T00:00:00", "dateUpdated": "2024-08-07T10:49:12.620Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-0414 (GCVE-0-2006-0414)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/19795 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/18576 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24285 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/18323 | vdb-entry, x_refsource_BID | |
http://www.osvdb.org/22689 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/20514 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200606-04.xml | vendor-advisory, x_refsource_GENTOO | |
http://tor.eff.org/cvs/tor/ChangeLog | x_refsource_CONFIRM | |
http://archives.seul.org/or/announce/Jan-2006/msg00001.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:34:14.515Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "19795", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19795" }, { "name": "18576", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18576" }, { "name": "tor-service-information-disclosure(24285)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24285" }, { "name": "18323", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/18323" }, { "name": "22689", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/22689" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2006/msg00001.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 allows remote attackers to identify hidden services via a malicious Tor server that attempts a large number of accesses of the hidden service, which eventually causes a circuit to be built through the malicious server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "19795", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19795" }, { "name": "18576", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18576" }, { "name": "tor-service-information-disclosure(24285)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24285" }, { "name": "18323", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/18323" }, { "name": "22689", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/22689" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archives.seul.org/or/announce/Jan-2006/msg00001.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-0414", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.1.20 allows remote attackers to identify hidden services via a malicious Tor server that attempts a large number of accesses of the hidden service, which eventually causes a circuit to be built through the malicious server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "19795", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19795" }, { "name": "18576", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18576" }, { "name": "tor-service-information-disclosure(24285)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24285" }, { "name": "18323", "refsource": "BID", "url": "http://www.securityfocus.com/bid/18323" }, { "name": "22689", "refsource": "OSVDB", "url": "http://www.osvdb.org/22689" }, { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "http://archives.seul.org/or/announce/Jan-2006/msg00001.html", "refsource": "CONFIRM", "url": "http://archives.seul.org/or/announce/Jan-2006/msg00001.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-0414", "datePublished": "2006-01-25T11:00:00", "dateReserved": "2006-01-25T00:00:00", "dateUpdated": "2024-08-07T16:34:14.515Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-2425 (GCVE-0-2009-2425)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/35546 | third-party-advisory, x_refsource_SECUNIA | |
http://archives.seul.org/or/announce/Jun-2009/msg00000.html | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51376 | vdb-entry, x_refsource_XF | |
http://www.osvdb.org/55340 | vdb-entry, x_refsource_OSVDB | |
http://www.vupen.com/english/advisories/2009/1716 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/35505 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:52:14.676Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "35546", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35546" }, { "name": "[or-announce] 20090625 Tor 0.2.0.35 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html" }, { "name": "tor-router-descriptors-dos(51376)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51376" }, { "name": "55340", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/55340" }, { "name": "ADV-2009-1716", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1716" }, { "name": "35505", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35505" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-06-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.0.35 allows remote attackers to cause a denial of service (application crash) via a malformed router descriptor." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "35546", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35546" }, { "name": "[or-announce] 20090625 Tor 0.2.0.35 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html" }, { "name": "tor-router-descriptors-dos(51376)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51376" }, { "name": "55340", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/55340" }, { "name": "ADV-2009-1716", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1716" }, { "name": "35505", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35505" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2425", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.0.35 allows remote attackers to cause a denial of service (application crash) via a malformed router descriptor." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "35546", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35546" }, { "name": "[or-announce] 20090625 Tor 0.2.0.35 is released", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html" }, { "name": "tor-router-descriptors-dos(51376)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51376" }, { "name": "55340", "refsource": "OSVDB", "url": "http://www.osvdb.org/55340" }, { "name": "ADV-2009-1716", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1716" }, { "name": "35505", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35505" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2425", "datePublished": "2009-07-10T17:00:00", "dateReserved": "2009-07-10T00:00:00", "dateUpdated": "2024-08-07T05:52:14.676Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-5398 (GCVE-0-2008-5398)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/47102 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/34583 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/32648 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/33025 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2008/3366 | vdb-entry, x_refsource_VUPEN | |
http://blog.torproject.org/blog/tor-0.2.0.32-released | x_refsource_CONFIRM | |
http://security.gentoo.org/glsa/glsa-200904-11.xml | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:49:12.389Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "tor-clientdnsreject-security-bypass(47102)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47102" }, { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34583" }, { "name": "32648", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32648" }, { "name": "33025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33025" }, { "name": "ADV-2008-3366", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3366" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-0.2.0.32-released" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.0.32 does not properly process the ClientDNSRejectInternalAddresses configuration option in situations where an exit relay issues a policy-based refusal of a stream, which allows remote exit relays to have an unknown impact by mapping an internal IP address to the destination hostname of a refused stream." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "tor-clientdnsreject-security-bypass(47102)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47102" }, { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34583" }, { "name": "32648", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32648" }, { "name": "33025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33025" }, { "name": "ADV-2008-3366", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3366" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-0.2.0.32-released" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5398", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.0.32 does not properly process the ClientDNSRejectInternalAddresses configuration option in situations where an exit relay issues a policy-based refusal of a stream, which allows remote exit relays to have an unknown impact by mapping an internal IP address to the destination hostname of a refused stream." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "tor-clientdnsreject-security-bypass(47102)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47102" }, { "name": "34583", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34583" }, { "name": "32648", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32648" }, { "name": "33025", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33025" }, { "name": "ADV-2008-3366", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/3366" }, { "name": "http://blog.torproject.org/blog/tor-0.2.0.32-released", "refsource": "CONFIRM", "url": "http://blog.torproject.org/blog/tor-0.2.0.32-released" }, { "name": "GLSA-200904-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5398", "datePublished": "2008-12-09T00:00:00", "dateReserved": "2008-12-08T00:00:00", "dateUpdated": "2024-08-07T10:49:12.389Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-4097 (GCVE-0-2007-4097)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://osvdb.org/46969 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/25035 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/26140 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2007/2634 | vdb-entry, x_refsource_VUPEN | |
http://archives.seul.org/or/announce/Jul-2007/msg00000.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:46:39.349Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46969", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/46969" }, { "name": "25035", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26140" }, { "name": "ADV-2007-2634", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.1.2.15 sends \"destroy cells\" containing the reason for tearing down a circuit, which allows remote attackers to obtain sensitive information, contrary to specifications." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-15T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "46969", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/46969" }, { "name": "25035", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26140" }, { "name": "ADV-2007-2634", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4097", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.2.15 sends \"destroy cells\" containing the reason for tearing down a circuit, which allows remote attackers to obtain sensitive information, contrary to specifications." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46969", "refsource": "OSVDB", "url": "http://osvdb.org/46969" }, { "name": "25035", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26140" }, { "name": "ADV-2007-2634", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4097", "datePublished": "2007-07-30T21:00:00", "dateReserved": "2007-07-30T00:00:00", "dateUpdated": "2024-08-07T14:46:39.349Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-0414 (GCVE-0-2009-0414)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2009/0210 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/34583 | third-party-advisory, x_refsource_SECUNIA | |
http://archives.seul.org/or/announce/Jan-2009/msg00000.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/33677 | third-party-advisory, x_refsource_SECUNIA | |
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00902.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securityfocus.com/bid/33399 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/33635 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200904-11.xml | vendor-advisory, x_refsource_GENTOO | |
http://blog.torproject.org/blog/tor-0.2.0.33-stable-released | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1021633 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:31:26.160Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2009-0210", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0210" }, { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090122 Tor 0.2.0.33 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2009/msg00000.html" }, { "name": "33677", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33677" }, { "name": "FEDORA-2009-0897", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00902.html" }, { "name": "33399", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/33399" }, { "name": "33635", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33635" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-0.2.0.33-stable-released" }, { "name": "1021633", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021633" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-01-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Tor before 0.2.0.33 has unspecified impact and remote attack vectors that trigger heap corruption." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2009-0210", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0210" }, { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090122 Tor 0.2.0.33 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jan-2009/msg00000.html" }, { "name": "33677", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33677" }, { "name": "FEDORA-2009-0897", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00902.html" }, { "name": "33399", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/33399" }, { "name": "33635", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33635" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-0.2.0.33-stable-released" }, { "name": "1021633", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021633" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0414", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Tor before 0.2.0.33 has unspecified impact and remote attack vectors that trigger heap corruption." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2009-0210", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0210" }, { "name": "34583", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090122 Tor 0.2.0.33 is released", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jan-2009/msg00000.html" }, { "name": "33677", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33677" }, { "name": "FEDORA-2009-0897", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00902.html" }, { "name": "33399", "refsource": "BID", "url": "http://www.securityfocus.com/bid/33399" }, { "name": "33635", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33635" }, { "name": "GLSA-200904-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "name": "http://blog.torproject.org/blog/tor-0.2.0.33-stable-released", "refsource": "CONFIRM", "url": "http://blog.torproject.org/blog/tor-0.2.0.33-stable-released" }, { "name": "1021633", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021633" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-0414", "datePublished": "2009-02-03T23:00:00", "dateReserved": "2009-02-03T00:00:00", "dateUpdated": "2024-08-07T04:31:26.160Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0491 (GCVE-0-2011-0491)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://archives.seul.org/or/announce/Jan-2011/msg00000.html | mailing-list, x_refsource_MLIST | |
https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog | x_refsource_CONFIRM | |
https://trac.torproject.org/projects/tor/ticket/2324 | x_refsource_CONFIRM | |
http://blog.torproject.org/blog/tor-02129-released-security-patches | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/64888 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/45953 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:09.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://trac.torproject.org/projects/tor/ticket/2324" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-torrealloc-dos(64888)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64888" }, { "name": "45953", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45953" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The tor_realloc function in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote attackers to cause a denial of service (daemon crash) via unspecified vectors, related to \"underflow errors.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://trac.torproject.org/projects/tor/ticket/2324" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-torrealloc-dos(64888)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64888" }, { "name": "45953", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45953" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0491", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The tor_realloc function in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote attackers to cause a denial of service (daemon crash) via unspecified vectors, related to \"underflow errors.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "name": "https://trac.torproject.org/projects/tor/ticket/2324", "refsource": "CONFIRM", "url": "https://trac.torproject.org/projects/tor/ticket/2324" }, { "name": "http://blog.torproject.org/blog/tor-02129-released-security-patches", "refsource": "CONFIRM", "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-torrealloc-dos(64888)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64888" }, { "name": "45953", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45953" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0491", "datePublished": "2011-01-19T11:00:00", "dateReserved": "2011-01-18T00:00:00", "dateUpdated": "2024-08-06T21:51:09.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-4897 (GCVE-0-2011-4897)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://blog.torproject.org/blog/tor-02225-alpha-out | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:16:35.184Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.torproject.org/blog/tor-02225-alpha-out" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.25-alpha, when configured as a relay without the Nickname configuration option, uses the local hostname as the Nickname value, which allows remote attackers to obtain potentially sensitive information by reading this value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-12-23T02:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.torproject.org/blog/tor-02225-alpha-out" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-4897", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.2.25-alpha, when configured as a relay without the Nickname configuration option, uses the local hostname as the Nickname value, which allows remote attackers to obtain potentially sensitive information by reading this value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.torproject.org/blog/tor-02225-alpha-out", "refsource": "CONFIRM", "url": "https://blog.torproject.org/blog/tor-02225-alpha-out" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-4897", "datePublished": "2011-12-23T02:00:00Z", "dateReserved": "2011-12-22T00:00:00Z", "dateUpdated": "2024-09-16T16:53:14.667Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-3519 (GCVE-0-2012-3519)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://security.gentoo.org/glsa/glsa-201301-03.xml | vendor-advisory, x_refsource_GENTOO | |
https://gitweb.torproject.org/tor.git/commit/308f6dad20675c42b29862f4269ad1fbfb00dc9a | x_refsource_CONFIRM | |
https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/50583 | third-party-advisory, x_refsource_SECUNIA | |
http://openwall.com/lists/oss-security/2012/08/21/6 | mailing-list, x_refsource_MLIST | |
https://trac.torproject.org/projects/tor/ticket/6537 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html | vendor-advisory, x_refsource_SUSE | |
https://gitweb.torproject.org/tor.git/commit/d48cebc5e498b0ae673635f40fc57cdddab45d5b | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:05:12.746Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201301-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/commit/308f6dad20675c42b29862f4269ad1fbfb00dc9a" }, { "name": "[tor-announce] 20120819 Tor 0.2.2.38 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "name": "50583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50583" }, { "name": "[oss-security] 20120821 Re: CVE Request -- Tor 0.2.2.38: Three issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://trac.torproject.org/projects/tor/ticket/6537" }, { "name": "openSUSE-SU-2012:1068", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/commit/d48cebc5e498b0ae673635f40fc57cdddab45d5b" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-08-19T00:00:00", "descriptions": [ { "lang": "en", "value": "routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-10-11T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "GLSA-201301-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/commit/308f6dad20675c42b29862f4269ad1fbfb00dc9a" }, { "name": "[tor-announce] 20120819 Tor 0.2.2.38 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "name": "50583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50583" }, { "name": "[oss-security] 20120821 Re: CVE Request -- Tor 0.2.2.38: Three issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://trac.torproject.org/projects/tor/ticket/6537" }, { "name": "openSUSE-SU-2012:1068", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/commit/d48cebc5e498b0ae673635f40fc57cdddab45d5b" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3519", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201301-03", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "name": "https://gitweb.torproject.org/tor.git/commit/308f6dad20675c42b29862f4269ad1fbfb00dc9a", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/commit/308f6dad20675c42b29862f4269ad1fbfb00dc9a" }, { "name": "[tor-announce] 20120819 Tor 0.2.2.38 is released", "refsource": "MLIST", "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "name": "50583", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/50583" }, { "name": "[oss-security] 20120821 Re: CVE Request -- Tor 0.2.2.38: Three issues", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "name": "https://trac.torproject.org/projects/tor/ticket/6537", "refsource": "CONFIRM", "url": "https://trac.torproject.org/projects/tor/ticket/6537" }, { "name": "openSUSE-SU-2012:1068", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "name": "https://gitweb.torproject.org/tor.git/commit/d48cebc5e498b0ae673635f40fc57cdddab45d5b", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/commit/d48cebc5e498b0ae673635f40fc57cdddab45d5b" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-3519", "datePublished": "2012-08-26T01:00:00", "dateReserved": "2012-06-14T00:00:00", "dateUpdated": "2024-08-06T20:05:12.746Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3410 (GCVE-0-2006-3410)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/25882 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/20277 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26798 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/18323 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/20514 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200606-04.xml | vendor-advisory, x_refsource_GENTOO | |
http://tor.eff.org/cvs/tor/ChangeLog | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.876Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25882", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25882" }, { "name": "20277", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20277" }, { "name": "tor-circuits-information-disclosure(26798)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26798" }, { "name": "18323", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/18323" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-05-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 creates \"internal circuits\" primarily consisting of nodes with \"useful exit nodes,\" which allows remote attackers to conduct unspecified statistical attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25882", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25882" }, { "name": "20277", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20277" }, { "name": "tor-circuits-information-disclosure(26798)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26798" }, { "name": "18323", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/18323" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3410", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.1.20 creates \"internal circuits\" primarily consisting of nodes with \"useful exit nodes,\" which allows remote attackers to conduct unspecified statistical attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25882", "refsource": "OSVDB", "url": "http://www.osvdb.org/25882" }, { "name": "20277", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20277" }, { "name": "tor-circuits-information-disclosure(26798)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26798" }, { "name": "18323", "refsource": "BID", "url": "http://www.securityfocus.com/bid/18323" }, { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3410", "datePublished": "2006-07-07T00:00:00", "dateReserved": "2006-07-06T00:00:00", "dateUpdated": "2024-08-07T18:30:32.876Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3413 (GCVE-0-2006-3413)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/25875 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/20514 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200606-04.xml | vendor-advisory, x_refsource_GENTOO | |
http://tor.eff.org/cvs/tor/ChangeLog | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.887Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25875", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25875" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The privoxy configuration file in Tor before 0.1.1.20, when run on Apple OS X, logs all data via the \"logfile\", which allows attackers to obtain potentially sensitive information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-07-07T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25875", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25875" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3413", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The privoxy configuration file in Tor before 0.1.1.20, when run on Apple OS X, logs all data via the \"logfile\", which allows attackers to obtain potentially sensitive information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25875", "refsource": "OSVDB", "url": "http://www.osvdb.org/25875" }, { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3413", "datePublished": "2006-07-07T00:00:00Z", "dateReserved": "2006-07-06T00:00:00Z", "dateUpdated": "2024-09-17T01:35:51.512Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-2643 (GCVE-0-2005-2643)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/16424 | third-party-advisory, x_refsource_SECUNIA | |
http://archives.seul.org/or/announce/Aug-2005/msg00002.html | mailing-list, x_refsource_MLIST | |
http://marc.info/?l=bugtraq&m=112448002732443&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://securitytracker.com/id?1014739 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:45:01.889Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "16424", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16424" }, { "name": "[or-announce] 20050811 Tor security advisory: DH handshake flaw", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Aug-2005/msg00002.html" }, { "name": "20050819 Fwd: Tor security advisory: DH handshake flaw", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=112448002732443\u0026w=2" }, { "name": "1014739", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014739" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-08-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "16424", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16424" }, { "name": "[or-announce] 20050811 Tor security advisory: DH handshake flaw", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Aug-2005/msg00002.html" }, { "name": "20050819 Fwd: Tor security advisory: DH handshake flaw", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=112448002732443\u0026w=2" }, { "name": "1014739", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014739" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2643", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "16424", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16424" }, { "name": "[or-announce] 20050811 Tor security advisory: DH handshake flaw", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Aug-2005/msg00002.html" }, { "name": "20050819 Fwd: Tor security advisory: DH handshake flaw", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=112448002732443\u0026w=2" }, { "name": "1014739", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014739" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2643", "datePublished": "2005-08-21T04:00:00", "dateReserved": "2005-08-21T00:00:00", "dateUpdated": "2024-08-07T22:45:01.889Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-0937 (GCVE-0-2009-0937)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/34583 | third-party-advisory, x_refsource_SECUNIA | |
http://archives.seul.org/or/announce/Feb-2009/msg00000.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/33880 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/33713 | vdb-entry, x_refsource_BID | |
http://security.gentoo.org/glsa/glsa-200904-11.xml | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:57:16.638Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-04-01T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0937", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34583", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "refsource": "BID", "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-0937", "datePublished": "2009-03-18T01:00:00", "dateReserved": "2009-03-17T00:00:00", "dateUpdated": "2024-08-07T04:57:16.638Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3415 (GCVE-0-2006-3415)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/20514 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200606-04.xml | vendor-advisory, x_refsource_GENTOO | |
http://tor.eff.org/cvs/tor/ChangeLog | x_refsource_CONFIRM | |
http://www.osvdb.org/25878 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.870Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "25878", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25878" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 uses improper logic to validate the \"OR\" destination, which allows remote attackers to perform a man-in-the-middle (MITM) attack via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-07-07T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "25878", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25878" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3415", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.1.20 uses improper logic to validate the \"OR\" destination, which allows remote attackers to perform a man-in-the-middle (MITM) attack via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "25878", "refsource": "OSVDB", "url": "http://www.osvdb.org/25878" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3415", "datePublished": "2006-07-07T00:00:00Z", "dateReserved": "2006-07-06T00:00:00Z", "dateUpdated": "2024-09-17T01:21:18.070Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-2426 (GCVE-0-2009-2426)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/35546 | third-party-advisory, x_refsource_SECUNIA | |
http://archives.seul.org/or/announce/Jun-2009/msg00000.html | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51377 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2009/1716 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/35505 | vdb-entry, x_refsource_BID | |
http://www.osvdb.org/55341 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:52:14.789Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "35546", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35546" }, { "name": "[or-announce] 20090625 Tor 0.2.0.35 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html" }, { "name": "tor-connectionedge-spoofing(51377)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51377" }, { "name": "ADV-2009-1716", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1716" }, { "name": "35505", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35505" }, { "name": "55341", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/55341" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-06-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The connection_edge_process_relay_cell_not_open function in src/or/relay.c in Tor 0.2.x before 0.2.0.35 and 0.1.x before 0.1.2.8-beta allows exit relays to have an unspecified impact by causing controllers to accept DNS responses that redirect to an internal IP address via unknown vectors. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "35546", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35546" }, { "name": "[or-announce] 20090625 Tor 0.2.0.35 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html" }, { "name": "tor-connectionedge-spoofing(51377)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51377" }, { "name": "ADV-2009-1716", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1716" }, { "name": "35505", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35505" }, { "name": "55341", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/55341" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2426", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The connection_edge_process_relay_cell_not_open function in src/or/relay.c in Tor 0.2.x before 0.2.0.35 and 0.1.x before 0.1.2.8-beta allows exit relays to have an unspecified impact by causing controllers to accept DNS responses that redirect to an internal IP address via unknown vectors. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "35546", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35546" }, { "name": "[or-announce] 20090625 Tor 0.2.0.35 is released", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html" }, { "name": "tor-connectionedge-spoofing(51377)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51377" }, { "name": "ADV-2009-1716", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1716" }, { "name": "35505", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35505" }, { "name": "55341", "refsource": "OSVDB", "url": "http://www.osvdb.org/55341" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2426", "datePublished": "2009-07-10T17:00:00", "dateReserved": "2009-07-10T00:00:00", "dateUpdated": "2024-08-07T05:52:14.789Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3418 (GCVE-0-2006-3418)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/25881 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/20514 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200606-04.xml | vendor-advisory, x_refsource_GENTOO | |
http://tor.eff.org/cvs/tor/ChangeLog | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:33.523Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25881", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25881" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 does not validate that a server descriptor\u0027s fingerprint line matches its identity key, which allows remote attackers to spoof the fingerprint line, which might be trusted by users or other applications." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-07-07T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25881", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25881" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3418", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.1.20 does not validate that a server descriptor\u0027s fingerprint line matches its identity key, which allows remote attackers to spoof the fingerprint line, which might be trusted by users or other applications." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25881", "refsource": "OSVDB", "url": "http://www.osvdb.org/25881" }, { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3418", "datePublished": "2006-07-07T00:00:00Z", "dateReserved": "2006-07-06T00:00:00Z", "dateUpdated": "2024-09-17T00:52:27.267Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-3518 (GCVE-0-2012-3518)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://security.gentoo.org/glsa/glsa-201301-03.xml | vendor-advisory, x_refsource_GENTOO | |
https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/50583 | third-party-advisory, x_refsource_SECUNIA | |
http://openwall.com/lists/oss-security/2012/08/21/6 | mailing-list, x_refsource_MLIST | |
https://gitweb.torproject.org/tor.git/commit/55f635745afacefffdaafc72cc176ca7ab817546 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html | vendor-advisory, x_refsource_SUSE | |
https://trac.torproject.org/projects/tor/ticket/6530 | x_refsource_CONFIRM | |
https://gitweb.torproject.org/tor.git/commit/57e35ad3d91724882c345ac709666a551a977f0f | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:05:12.799Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201301-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "name": "[tor-announce] 20120819 Tor 0.2.2.38 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "name": "50583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50583" }, { "name": "[oss-security] 20120821 Re: CVE Request -- Tor 0.2.2.38: Three issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/commit/55f635745afacefffdaafc72cc176ca7ab817546" }, { "name": "openSUSE-SU-2012:1068", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://trac.torproject.org/projects/tor/ticket/6530" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/commit/57e35ad3d91724882c345ac709666a551a977f0f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-08-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted (1) vote document or (2) consensus document." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-10-11T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "GLSA-201301-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "name": "[tor-announce] 20120819 Tor 0.2.2.38 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "name": "50583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50583" }, { "name": "[oss-security] 20120821 Re: CVE Request -- Tor 0.2.2.38: Three issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/commit/55f635745afacefffdaafc72cc176ca7ab817546" }, { "name": "openSUSE-SU-2012:1068", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://trac.torproject.org/projects/tor/ticket/6530" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/commit/57e35ad3d91724882c345ac709666a551a977f0f" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3518", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted (1) vote document or (2) consensus document." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201301-03", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "name": "[tor-announce] 20120819 Tor 0.2.2.38 is released", "refsource": "MLIST", "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "name": "50583", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/50583" }, { "name": "[oss-security] 20120821 Re: CVE Request -- Tor 0.2.2.38: Three issues", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "name": "https://gitweb.torproject.org/tor.git/commit/55f635745afacefffdaafc72cc176ca7ab817546", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/commit/55f635745afacefffdaafc72cc176ca7ab817546" }, { "name": "openSUSE-SU-2012:1068", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "name": "https://trac.torproject.org/projects/tor/ticket/6530", "refsource": "CONFIRM", "url": "https://trac.torproject.org/projects/tor/ticket/6530" }, { "name": "https://gitweb.torproject.org/tor.git/commit/57e35ad3d91724882c345ac709666a551a977f0f", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/commit/57e35ad3d91724882c345ac709666a551a977f0f" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-3518", "datePublished": "2012-08-26T01:00:00", "dateReserved": "2012-06-14T00:00:00", "dateUpdated": "2024-08-06T20:05:12.799Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2769 (GCVE-0-2011-2769)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://blog.torproject.org/blog/tor-02234-released-security-patches | x_refsource_CONFIRM | |
http://www.debian.org/security/2011/dsa-2331 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:15:30.687Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "name": "DSA-2331", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-10-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-01-19T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "name": "DSA-2331", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-2769", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.torproject.org/blog/tor-02234-released-security-patches", "refsource": "CONFIRM", "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "name": "DSA-2331", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2331" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-2769", "datePublished": "2011-12-23T02:00:00", "dateReserved": "2011-07-19T00:00:00", "dateUpdated": "2024-08-06T23:15:30.687Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0493 (GCVE-0-2011-0493)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://archives.seul.org/or/announce/Jan-2011/msg00000.html | mailing-list, x_refsource_MLIST | |
https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog | x_refsource_CONFIRM | |
https://trac.torproject.org/projects/tor/ticket/2352 | x_refsource_CONFIRM | |
http://blog.torproject.org/blog/tor-02129-released-security-patches | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/64864 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/45953 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:58:24.443Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://trac.torproject.org/projects/tor/ticket/2352" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-routercache-dos(64864)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64864" }, { "name": "45953", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45953" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha might allow remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors related to malformed router caches and improper handling of integer values." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://trac.torproject.org/projects/tor/ticket/2352" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-routercache-dos(64864)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64864" }, { "name": "45953", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45953" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0493", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha might allow remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors related to malformed router caches and improper handling of integer values." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "name": "https://trac.torproject.org/projects/tor/ticket/2352", "refsource": "CONFIRM", "url": "https://trac.torproject.org/projects/tor/ticket/2352" }, { "name": "http://blog.torproject.org/blog/tor-02129-released-security-patches", "refsource": "CONFIRM", "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-routercache-dos(64864)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64864" }, { "name": "45953", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45953" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0493", "datePublished": "2011-01-19T11:00:00", "dateReserved": "2011-01-18T00:00:00", "dateUpdated": "2024-08-06T21:58:24.443Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-4098 (GCVE-0-2007-4098)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/25035 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/26140 | third-party-advisory, x_refsource_SECUNIA | |
http://osvdb.org/46970 | vdb-entry, x_refsource_OSVDB | |
http://www.vupen.com/english/advisories/2007/2634 | vdb-entry, x_refsource_VUPEN | |
http://archives.seul.org/or/announce/Jul-2007/msg00000.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:46:38.593Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25035", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26140" }, { "name": "46970", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/46970" }, { "name": "ADV-2007-2634", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.1.2.15 does not properly distinguish \"streamids from different exits,\" which might allow remote attackers with control over Tor routers to inject cells into arbitrary streams." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-15T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25035", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26140" }, { "name": "46970", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/46970" }, { "name": "ADV-2007-2634", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4098", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.2.15 does not properly distinguish \"streamids from different exits,\" which might allow remote attackers with control over Tor routers to inject cells into arbitrary streams." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25035", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26140" }, { "name": "46970", "refsource": "OSVDB", "url": "http://osvdb.org/46970" }, { "name": "ADV-2007-2634", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4098", "datePublished": "2007-07-30T21:00:00", "dateReserved": "2007-07-30T00:00:00", "dateUpdated": "2024-08-07T14:46:38.593Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3416 (GCVE-0-2006-3416)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/20514 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200606-04.xml | vendor-advisory, x_refsource_GENTOO | |
http://tor.eff.org/cvs/tor/ChangeLog | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:33.324Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 kills the circuit when it receives an unrecognized relay command, which causes network circuits to be disbanded. NOTE: while this item is listed under the \"Security fixes\" section of the developer changelog, the developer clarified on 20060707 that this is only a self-DoS. Therefore this issue should not be included in CVE" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-07-07T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "tags": [ "disputed" ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3416", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** DISPUTED ** Tor before 0.1.1.20 kills the circuit when it receives an unrecognized relay command, which causes network circuits to be disbanded. NOTE: while this item is listed under the \"Security fixes\" section of the developer changelog, the developer clarified on 20060707 that this is only a self-DoS. Therefore this issue should not be included in CVE." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3416", "datePublished": "2006-07-07T00:00:00Z", "dateReserved": "2006-07-06T00:00:00Z", "dateUpdated": "2024-09-17T04:18:47.715Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-4896 (GCVE-0-2011-4896)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://blog.torproject.org/blog/tor-02224-alpha-out | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:16:35.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.torproject.org/blog/tor-02224-alpha-out" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-12-23T02:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.torproject.org/blog/tor-02224-alpha-out" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-4896", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.torproject.org/blog/tor-02224-alpha-out", "refsource": "CONFIRM", "url": "https://blog.torproject.org/blog/tor-02224-alpha-out" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-4896", "datePublished": "2011-12-23T02:00:00Z", "dateReserved": "2011-12-22T00:00:00Z", "dateUpdated": "2024-09-16T18:28:19.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-0936 (GCVE-0-2009-0936)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/34583 | third-party-advisory, x_refsource_SECUNIA | |
http://archives.seul.org/or/announce/Feb-2009/msg00000.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/33880 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/33713 | vdb-entry, x_refsource_BID | |
http://security.gentoo.org/glsa/glsa-200904-11.xml | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:57:16.420Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Tor before 0.2.0.34 allows attackers to cause a denial of service (infinite loop) via \"corrupt votes.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-04-01T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0936", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Tor before 0.2.0.34 allows attackers to cause a denial of service (infinite loop) via \"corrupt votes.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34583", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "refsource": "BID", "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-0936", "datePublished": "2009-03-18T01:00:00", "dateReserved": "2009-03-17T00:00:00", "dateUpdated": "2024-08-07T04:57:16.420Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0492 (GCVE-0-2011-0492)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://archives.seul.org/or/announce/Jan-2011/msg00000.html | mailing-list, x_refsource_MLIST | |
https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog | x_refsource_CONFIRM | |
http://blog.torproject.org/blog/tor-02129-released-security-patches | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/64867 | vdb-entry, x_refsource_XF | |
https://trac.torproject.org/projects/tor/ticket/2326 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/45953 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:09.078Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-blobs-dos(64867)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64867" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://trac.torproject.org/projects/tor/ticket/2326" }, { "name": "45953", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45953" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (assertion failure and daemon exit) via blobs that trigger a certain file size, as demonstrated by the cached-descriptors.new file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-blobs-dos(64867)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64867" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://trac.torproject.org/projects/tor/ticket/2326" }, { "name": "45953", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45953" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0492", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (assertion failure and daemon exit) via blobs that trigger a certain file size, as demonstrated by the cached-descriptors.new file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "name": "http://blog.torproject.org/blog/tor-02129-released-security-patches", "refsource": "CONFIRM", "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-blobs-dos(64867)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64867" }, { "name": "https://trac.torproject.org/projects/tor/ticket/2326", "refsource": "CONFIRM", "url": "https://trac.torproject.org/projects/tor/ticket/2326" }, { "name": "45953", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45953" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0492", "datePublished": "2011-01-19T11:00:00", "dateReserved": "2011-01-18T00:00:00", "dateUpdated": "2024-08-06T21:51:09.078Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3412 (GCVE-0-2006-3412)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/20514 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200606-04.xml | vendor-advisory, x_refsource_GENTOO | |
http://tor.eff.org/cvs/tor/ChangeLog | x_refsource_CONFIRM | |
http://www.osvdb.org/25874 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.895Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "25874", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25874" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 does not sufficiently obey certain firewall options, which allows remote attackers to bypass intended access restrictions for dirservers, direct connections, or proxy servers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-07-07T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "25874", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25874" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3412", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.1.20 does not sufficiently obey certain firewall options, which allows remote attackers to bypass intended access restrictions for dirservers, direct connections, or proxy servers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "25874", "refsource": "OSVDB", "url": "http://www.osvdb.org/25874" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3412", "datePublished": "2006-07-07T00:00:00Z", "dateReserved": "2006-07-06T00:00:00Z", "dateUpdated": "2024-09-17T04:24:14.622Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-3165 (GCVE-0-2007-3165)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/25415 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2007/1964 | vdb-entry, x_refsource_VUPEN | |
http://osvdb.org/35670 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/24180 | vdb-entry, x_refsource_BID | |
http://archives.seul.org/or/announce/May-2007/msg00000.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:05:29.252Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25415", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25415" }, { "name": "ADV-2007-1964", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1964" }, { "name": "35670", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/35670" }, { "name": "24180", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24180" }, { "name": "[or-announce] 20070525 Tor 0.1.2.14 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/May-2007/msg00000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.1.2.14 can construct circuits in which an entry guard is in the same family as the exit node, which might compromise the anonymity of traffic sources and destinations by exposing traffic to inappropriate remote observers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-15T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25415", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25415" }, { "name": "ADV-2007-1964", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1964" }, { "name": "35670", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/35670" }, { "name": "24180", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24180" }, { "name": "[or-announce] 20070525 Tor 0.1.2.14 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/May-2007/msg00000.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3165", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.2.14 can construct circuits in which an entry guard is in the same family as the exit node, which might compromise the anonymity of traffic sources and destinations by exposing traffic to inappropriate remote observers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25415", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25415" }, { "name": "ADV-2007-1964", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1964" }, { "name": "35670", "refsource": "OSVDB", "url": "http://osvdb.org/35670" }, { "name": "24180", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24180" }, { "name": "[or-announce] 20070525 Tor 0.1.2.14 is released", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/May-2007/msg00000.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3165", "datePublished": "2007-06-11T22:00:00", "dateReserved": "2007-06-11T00:00:00", "dateUpdated": "2024-08-07T14:05:29.252Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-2050 (GCVE-0-2005-2050)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/15764/ | third-party-advisory, x_refsource_SECUNIA | |
http://archives.seul.org/or/announce/Jun-2005/msg00001.html | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/21093 | vdb-entry, x_refsource_XF | |
http://www.gentoo.org/security/en/glsa/glsa-200506-18.xml | vendor-advisory, x_refsource_GENTOO | |
http://bugs.gentoo.org/show_bug.cgi?id=96320 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:15:36.831Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "15764", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/15764/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jun-2005/msg00001.html" }, { "name": "tor-information-disclosure(21093)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21093" }, { "name": "GLSA-200506-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200506-18.xml" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=96320" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-06-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in Tor before 0.1.0.10 allows remote attackers to read arbitrary memory and possibly key information from the exit server\u0027s process space." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "15764", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/15764/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://archives.seul.org/or/announce/Jun-2005/msg00001.html" }, { "name": "tor-information-disclosure(21093)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21093" }, { "name": "GLSA-200506-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200506-18.xml" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=96320" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2050", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unknown vulnerability in Tor before 0.1.0.10 allows remote attackers to read arbitrary memory and possibly key information from the exit server\u0027s process space." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "15764", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/15764/" }, { "name": "http://archives.seul.org/or/announce/Jun-2005/msg00001.html", "refsource": "MISC", "url": "http://archives.seul.org/or/announce/Jun-2005/msg00001.html" }, { "name": "tor-information-disclosure(21093)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21093" }, { "name": "GLSA-200506-18", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200506-18.xml" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=96320", "refsource": "MISC", "url": "http://bugs.gentoo.org/show_bug.cgi?id=96320" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2050", "datePublished": "2005-06-26T04:00:00", "dateReserved": "2005-06-26T00:00:00", "dateUpdated": "2024-08-07T22:15:36.831Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0016 (GCVE-0-2011-0016)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:36:02.377Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "ADV-2011-0131", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "name": "42907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42907" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "1024980", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024980" }, { "name": "ADV-2011-0132", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://trac.torproject.org/projects/tor/ticket/2385" }, { "name": "DSA-2148", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2148" }, { "name": "42905", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42905" }, { "name": "[oss-security] 20110118 Re: CVE request: tor", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/01/18/7" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://trac.torproject.org/projects/tor/ticket/2384" }, { "name": "45832", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45832" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly manage key data in memory, which might allow local users to obtain sensitive information by leveraging the ability to read memory that was previously used by a different process." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-01-22T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "ADV-2011-0131", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "name": "42907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42907" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "1024980", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024980" }, { "name": "ADV-2011-0132", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://trac.torproject.org/projects/tor/ticket/2385" }, { "name": "DSA-2148", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2148" }, { "name": "42905", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42905" }, { "name": "[oss-security] 20110118 Re: CVE request: tor", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/01/18/7" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://trac.torproject.org/projects/tor/ticket/2384" }, { "name": "45832", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45832" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-0016", "datePublished": "2011-01-19T11:00:00", "dateReserved": "2010-12-07T00:00:00", "dateUpdated": "2024-08-06T21:36:02.377Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-0654 (GCVE-0-2009-0654)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf | x_refsource_MISC | |
http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Fu | x_refsource_MISC | |
http://blog.torproject.org/blog/one-cell-enough | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:40:05.357Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Fu" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.torproject.org/blog/one-cell-enough" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor 0.2.0.28, and probably 0.2.0.34 and earlier, allows remote attackers, with control of an entry router and an exit router, to confirm that a sender and receiver are communicating via vectors involving (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, and then observing cell recognition errors at the exit router. NOTE: the vendor disputes the significance of this issue, noting that the product\u0027s design \"accepted end-to-end correlation as an attack that is too expensive to solve.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-20T19:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Fu" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.torproject.org/blog/one-cell-enough" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0654", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor 0.2.0.28, and probably 0.2.0.34 and earlier, allows remote attackers, with control of an entry router and an exit router, to confirm that a sender and receiver are communicating via vectors involving (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, and then observing cell recognition errors at the exit router. NOTE: the vendor disputes the significance of this issue, noting that the product\u0027s design \"accepted end-to-end correlation as an attack that is too expensive to solve.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf", "refsource": "MISC", "url": "http://www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf" }, { "name": "http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Fu", "refsource": "MISC", "url": "http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Fu" }, { "name": "http://blog.torproject.org/blog/one-cell-enough", "refsource": "MISC", "url": "http://blog.torproject.org/blog/one-cell-enough" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-0654", "datePublished": "2009-02-20T19:00:00Z", "dateReserved": "2009-02-20T00:00:00Z", "dateUpdated": "2024-09-17T03:13:48.226Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-4174 (GCVE-0-2007-4174)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/25188 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36407 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id?1018510 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35784 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2007/2768 | vdb-entry, x_refsource_VUPEN | |
http://osvdb.org/36271 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/26301 | third-party-advisory, x_refsource_SECUNIA | |
http://archives.seul.org/or/announce/Sep-2007/msg00000.html | mailing-list, x_refsource_MLIST | |
http://archives.seul.org/or/announce/Aug-2007/msg00000.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:46:39.367Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25188", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25188" }, { "name": "tor-control-command-execution(36407)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36407" }, { "name": "1018510", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018510" }, { "name": "tor-controlport-security-bypass(35784)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35784" }, { "name": "ADV-2007-2768", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2768" }, { "name": "36271", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36271" }, { "name": "26301", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26301" }, { "name": "[or-announce] 20070901 Tor security advisory: cross-protocol http form attack", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Sep-2007/msg00000.html" }, { "name": "[or-announce] 20070802 Tor 0.1.2.16 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Aug-2007/msg00000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.1.2.16, when ControlPort is enabled, does not properly restrict commands to localhost port 9051, which allows remote attackers to modify the torrc configuration file, compromise anonymity, and have other unspecified impact via HTTP POST data containing commands without valid authentication, as demonstrated by an HTML form (1) hosted on a web site or (2) injected by a Tor exit node." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25188", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25188" }, { "name": "tor-control-command-execution(36407)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36407" }, { "name": "1018510", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018510" }, { "name": "tor-controlport-security-bypass(35784)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35784" }, { "name": "ADV-2007-2768", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2768" }, { "name": "36271", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36271" }, { "name": "26301", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26301" }, { "name": "[or-announce] 20070901 Tor security advisory: cross-protocol http form attack", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Sep-2007/msg00000.html" }, { "name": "[or-announce] 20070802 Tor 0.1.2.16 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Aug-2007/msg00000.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4174", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.2.16, when ControlPort is enabled, does not properly restrict commands to localhost port 9051, which allows remote attackers to modify the torrc configuration file, compromise anonymity, and have other unspecified impact via HTTP POST data containing commands without valid authentication, as demonstrated by an HTML form (1) hosted on a web site or (2) injected by a Tor exit node." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25188", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25188" }, { "name": "tor-control-command-execution(36407)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36407" }, { "name": "1018510", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018510" }, { "name": "tor-controlport-security-bypass(35784)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35784" }, { "name": "ADV-2007-2768", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2768" }, { "name": "36271", "refsource": "OSVDB", "url": "http://osvdb.org/36271" }, { "name": "26301", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26301" }, { "name": "[or-announce] 20070901 Tor security advisory: cross-protocol http form attack", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Sep-2007/msg00000.html" }, { "name": "[or-announce] 20070802 Tor 0.1.2.16 is released", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Aug-2007/msg00000.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4174", "datePublished": "2007-08-07T10:00:00", "dateReserved": "2007-08-07T00:00:00", "dateUpdated": "2024-08-07T14:46:39.367Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0383 (GCVE-0-2010-0383)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/37901 | vdb-entry, x_refsource_BID | |
http://osvdb.org/61977 | vdb-entry, x_refsource_OSVDB | |
http://archives.seul.org/or/announce/Jan-2010/msg00000.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/38198 | third-party-advisory, x_refsource_SECUNIA | |
http://archives.seul.org/or/talk/Jan-2010/msg00161.html | mailing-list, x_refsource_MLIST | |
http://archives.seul.org/or/talk/Jan-2010/msg00165.html | mailing-list, x_refsource_MLIST | |
http://archives.seul.org/or/talk/Jan-2010/msg00162.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:45:12.236Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "37901", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37901" }, { "name": "61977", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/61977" }, { "name": "[or-announce] 20100121 Tor 0.2.1.22 is released (security fix)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2010/msg00000.html" }, { "name": "38198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38198" }, { "name": "[or-talk] 20100120 Tor Project infrastructure updates in response to security breach", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/talk/Jan-2010/msg00161.html" }, { "name": "[or-talk] 20100120 Re: Tor Project infrastructure updates in response to security breach", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/talk/Jan-2010/msg00165.html" }, { "name": "[or-talk] 20100120 Tor 0.2.2.7-alpha is out", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-01-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-02-05T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "37901", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37901" }, { "name": "61977", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/61977" }, { "name": "[or-announce] 20100121 Tor 0.2.1.22 is released (security fix)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jan-2010/msg00000.html" }, { "name": "38198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38198" }, { "name": "[or-talk] 20100120 Tor Project infrastructure updates in response to security breach", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/talk/Jan-2010/msg00161.html" }, { "name": "[or-talk] 20100120 Re: Tor Project infrastructure updates in response to security breach", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/talk/Jan-2010/msg00165.html" }, { "name": "[or-talk] 20100120 Tor 0.2.2.7-alpha is out", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-0383", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "37901", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37901" }, { "name": "61977", "refsource": "OSVDB", "url": "http://osvdb.org/61977" }, { "name": "[or-announce] 20100121 Tor 0.2.1.22 is released (security fix)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jan-2010/msg00000.html" }, { "name": "38198", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38198" }, { "name": "[or-talk] 20100120 Tor Project infrastructure updates in response to security breach", "refsource": "MLIST", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00161.html" }, { "name": "[or-talk] 20100120 Re: Tor Project infrastructure updates in response to security breach", "refsource": "MLIST", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00165.html" }, { "name": "[or-talk] 20100120 Tor 0.2.2.7-alpha is out", "refsource": "MLIST", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-0383", "datePublished": "2010-01-25T19:00:00", "dateReserved": "2010-01-25T00:00:00", "dateUpdated": "2024-08-07T00:45:12.236Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-0939 (GCVE-0-2009-0939)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/34583 | third-party-advisory, x_refsource_SECUNIA | |
http://archives.seul.org/or/announce/Feb-2009/msg00000.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/33880 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/33713 | vdb-entry, x_refsource_BID | |
http://security.gentoo.org/glsa/glsa-200904-11.xml | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:57:16.916Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.0.34 treats incomplete IPv4 addresses as valid, which has unknown impact and attack vectors related to \"Spec conformance,\" as demonstrated using 192.168.0." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-04-01T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0939", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.0.34 treats incomplete IPv4 addresses as valid, which has unknown impact and attack vectors related to \"Spec conformance,\" as demonstrated using 192.168.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34583", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "refsource": "BID", "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-0939", "datePublished": "2009-03-18T01:00:00", "dateReserved": "2009-03-17T00:00:00", "dateUpdated": "2024-08-07T04:57:16.916Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-4099 (GCVE-0-2007-4099)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://osvdb.org/46971 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/25035 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/26140 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2007/2634 | vdb-entry, x_refsource_VUPEN | |
http://archives.seul.org/or/announce/Jul-2007/msg00000.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:46:39.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46971", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/46971" }, { "name": "25035", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26140" }, { "name": "ADV-2007-2634", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.1.2.15 can select a guard node beyond the first listed never-before-connected-to guard node, which allows remote attackers with control of certain guard nodes to obtain sensitive information and possibly leverage further attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-15T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "46971", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/46971" }, { "name": "25035", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26140" }, { "name": "ADV-2007-2634", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4099", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.2.15 can select a guard node beyond the first listed never-before-connected-to guard node, which allows remote attackers with control of certain guard nodes to obtain sensitive information and possibly leverage further attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46971", "refsource": "OSVDB", "url": "http://osvdb.org/46971" }, { "name": "25035", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26140" }, { "name": "ADV-2007-2634", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4099", "datePublished": "2007-07-30T21:00:00", "dateReserved": "2007-07-30T00:00:00", "dateUpdated": "2024-08-07T14:46:39.354Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1924 (GCVE-0-2011-1924)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/43548 | third-party-advisory, x_refsource_SECUNIA | |
https://bugzilla.redhat.com/show_bug.cgi?id=705194 | x_refsource_CONFIRM | |
http://secunia.com/advisories/44862 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/46618 | vdb-entry, x_refsource_BID | |
https://gitweb.torproject.org/tor.git/commit/43414eb98821d3b5c6c65181d7545ce938f82c8e | x_refsource_CONFIRM | |
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061258.html | vendor-advisory, x_refsource_FEDORA | |
https://bugzilla.redhat.com/show_bug.cgi?id=705192 | x_refsource_CONFIRM | |
https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:46:00.774Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "43548", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43548" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705194" }, { "name": "44862", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44862" }, { "name": "46618", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46618" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/commit/43414eb98821d3b5c6c65181d7545ce938f82c8e" }, { "name": "FEDORA-2011-7972", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061258.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705192" }, { "name": "[tor-announce] 20110228 Tor 0.2.1.30 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the policy_summarize function in or/policies.c in Tor before 0.2.1.30 allows remote attackers to cause a denial of service (directory authority crash) via a crafted policy that triggers creation of a long port list." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-06-14T17:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "43548", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43548" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705194" }, { "name": "44862", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44862" }, { "name": "46618", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46618" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/commit/43414eb98821d3b5c6c65181d7545ce938f82c8e" }, { "name": "FEDORA-2011-7972", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061258.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705192" }, { "name": "[tor-announce] 20110228 Tor 0.2.1.30 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1924", "datePublished": "2011-06-14T17:00:00Z", "dateReserved": "2011-05-09T00:00:00Z", "dateUpdated": "2024-08-06T22:46:00.774Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-4895 (GCVE-0-2011-4895)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://blog.torproject.org/blog/tor-02234-released-security-patches | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:16:35.216Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-12-23T02:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-4895", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.torproject.org/blog/tor-02234-released-security-patches", "refsource": "CONFIRM", "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-4895", "datePublished": "2011-12-23T02:00:00Z", "dateReserved": "2011-12-22T00:00:00Z", "dateUpdated": "2024-09-17T01:55:32.706Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0490 (GCVE-0-2011-0490)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://archives.seul.org/or/announce/Jan-2011/msg00000.html | mailing-list, x_refsource_MLIST | |
https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog | x_refsource_CONFIRM | |
http://blog.torproject.org/blog/tor-02129-released-security-patches | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/64889 | vdb-entry, x_refsource_XF | |
https://trac.torproject.org/projects/tor/ticket/2190 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/45953 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.860Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-libevent-dos(64889)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64889" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://trac.torproject.org/projects/tor/ticket/2190" }, { "name": "45953", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45953" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha makes calls to Libevent within Libevent log handlers, which might allow remote attackers to cause a denial of service (daemon crash) via vectors that trigger certain log messages." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-libevent-dos(64889)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64889" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://trac.torproject.org/projects/tor/ticket/2190" }, { "name": "45953", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45953" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0490", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha makes calls to Libevent within Libevent log handlers, which might allow remote attackers to cause a denial of service (daemon crash) via vectors that trigger certain log messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "name": "http://blog.torproject.org/blog/tor-02129-released-security-patches", "refsource": "CONFIRM", "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-libevent-dos(64889)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64889" }, { "name": "https://trac.torproject.org/projects/tor/ticket/2190", "refsource": "CONFIRM", "url": "https://trac.torproject.org/projects/tor/ticket/2190" }, { "name": "45953", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45953" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0490", "datePublished": "2011-01-19T11:00:00", "dateReserved": "2011-01-18T00:00:00", "dateUpdated": "2024-08-06T21:51:08.860Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2778 (GCVE-0-2011-2778)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://blog.torproject.org/blog/tor-02235-released-security-patches | x_refsource_CONFIRM | |
http://www.debian.org/security/2011/dsa-2363 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:15:31.127Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.torproject.org/blog/tor-02235-released-security-patches" }, { "name": "DSA-2363", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2363" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-12-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-01-19T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.torproject.org/blog/tor-02235-released-security-patches" }, { "name": "DSA-2363", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2363" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-2778", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.torproject.org/blog/tor-02235-released-security-patches", "refsource": "CONFIRM", "url": "https://blog.torproject.org/blog/tor-02235-released-security-patches" }, { "name": "DSA-2363", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2363" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-2778", "datePublished": "2011-12-23T02:00:00", "dateReserved": "2011-07-19T00:00:00", "dateUpdated": "2024-08-06T23:15:31.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3408 (GCVE-0-2006-3408)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/20277 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/18323 | vdb-entry, x_refsource_BID | |
http://www.osvdb.org/25883 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/20514 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200606-04.xml | vendor-advisory, x_refsource_GENTOO | |
http://tor.eff.org/cvs/tor/ChangeLog | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26794 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.815Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20277", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20277" }, { "name": "18323", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/18323" }, { "name": "25883", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25883" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "tor-directory-server-dos(26794)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26794" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-05-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the directory server (dirserver) in Tor before 0.1.1.20 allows remote attackers to cause an unspecified denial of service via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20277", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20277" }, { "name": "18323", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/18323" }, { "name": "25883", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25883" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "tor-directory-server-dos(26794)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26794" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3408", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the directory server (dirserver) in Tor before 0.1.1.20 allows remote attackers to cause an unspecified denial of service via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20277", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20277" }, { "name": "18323", "refsource": "BID", "url": "http://www.securityfocus.com/bid/18323" }, { "name": "25883", "refsource": "OSVDB", "url": "http://www.osvdb.org/25883" }, { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "tor-directory-server-dos(26794)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26794" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3408", "datePublished": "2006-07-07T00:00:00", "dateReserved": "2006-07-06T00:00:00", "dateUpdated": "2024-08-07T18:30:32.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-3517 (GCVE-0-2012-3517)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://security.gentoo.org/glsa/glsa-201301-03.xml | vendor-advisory, x_refsource_GENTOO | |
https://bugzilla.redhat.com/show_bug.cgi?id=849949 | x_refsource_CONFIRM | |
https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html | mailing-list, x_refsource_MLIST | |
https://gitweb.torproject.org/tor.git/commit/62637fa22405278758febb1743da9af562524d4c | x_refsource_CONFIRM | |
http://openwall.com/lists/oss-security/2012/08/21/6 | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html | vendor-advisory, x_refsource_SUSE | |
https://trac.torproject.org/projects/tor/ticket/6480 | x_refsource_CONFIRM | |
http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:05:12.774Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201301-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849949" }, { "name": "[tor-announce] 20120819 Tor 0.2.2.38 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/commit/62637fa22405278758febb1743da9af562524d4c" }, { "name": "[oss-security] 20120821 Re: CVE Request -- Tor 0.2.2.38: Three issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "name": "openSUSE-SU-2012:1068", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://trac.torproject.org/projects/tor/ticket/6480" }, { "name": "FEDORA-2012-14638", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-08-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-10-11T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "GLSA-201301-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849949" }, { "name": "[tor-announce] 20120819 Tor 0.2.2.38 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/commit/62637fa22405278758febb1743da9af562524d4c" }, { "name": "[oss-security] 20120821 Re: CVE Request -- Tor 0.2.2.38: Three issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "name": "openSUSE-SU-2012:1068", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://trac.torproject.org/projects/tor/ticket/6480" }, { "name": "FEDORA-2012-14638", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3517", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201301-03", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=849949", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849949" }, { "name": "[tor-announce] 20120819 Tor 0.2.2.38 is released", "refsource": "MLIST", "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "name": "https://gitweb.torproject.org/tor.git/commit/62637fa22405278758febb1743da9af562524d4c", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/commit/62637fa22405278758febb1743da9af562524d4c" }, { "name": "[oss-security] 20120821 Re: CVE Request -- Tor 0.2.2.38: Three issues", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "name": "openSUSE-SU-2012:1068", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "name": "https://trac.torproject.org/projects/tor/ticket/6480", "refsource": "CONFIRM", "url": "https://trac.torproject.org/projects/tor/ticket/6480" }, { "name": "FEDORA-2012-14638", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-3517", "datePublished": "2012-08-26T01:00:00", "dateReserved": "2012-06-14T00:00:00", "dateUpdated": "2024-08-06T20:05:12.774Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201401-0517
Vulnerability from variot
Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors. Tor (The Onion Router) is an implementation of the second generation onion routing, which is mainly used to access the Internet anonymously. There are security holes in Tor. An attacker could use this vulnerability to bypass security restrictions. There are vulnerabilities in Tor 0.2.4.19. Other versions may also be affected. This may aid in further attacks.
Update to version 0.2.4.22 solves these major and security problems:
-
Block authority signing keys that were used on authorities vulnerable to the heartbleed bug in OpenSSL (CVE-2014-0160).
-
Fix a memory leak that could occur if a microdescriptor parse fails during the tokenizing step.
-
The relay ciphersuite list is now generated automatically based on uniform criteria, and includes all OpenSSL ciphersuites with acceptable strength and forward secrecy.
-
Relays now trust themselves to have a better view than clients of which TLS ciphersuites are better than others.
-
Clients now try to advertise the same list of ciphersuites as Firefox 28.
For other changes see the upstream change log
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7295 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160 http://advisories.mageia.org/MGASA-2014-0059.html http://advisories.mageia.org/MGASA-2014-0256.html
Updated Packages:
Mandriva Business Server 1/X86_64: 77035fd2ff3c6df5effbaf9ee78bdaf4 mbs1/x86_64/tor-0.2.4.22-1.mbs1.x86_64.rpm cccaec1a8425ebfce0bb7d8057d38d6e mbs1/SRPMS/tor-0.2.4.22-1.mbs1.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFTmDAPmqjQ0CJFipgRAqq4AJ9ZIEn/fqUynENotuSA2kTLnKwpJgCgkh59 ssWQCdn4l3H2KyxX+IQBsxw= =fSis -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201401-0517", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "torproject", "version": "0.2.4.1" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "torproject", "version": "0.2.4.7" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "torproject", "version": "0.2.4.3" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "torproject", "version": "0.2.4.10" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "torproject", "version": "0.2.4.8" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "torproject", "version": "0.2.4.9" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "torproject", "version": "0.2.4.6" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "torproject", "version": "0.2.4.4" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "torproject", "version": "0.2.4.5" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "torproject", "version": "0.2.4.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.2.4.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.2.4.12" }, { "model": "tor", "scope": "lte", "trust": 1.0, "vendor": "torproject", "version": "0.2.4.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.2.4.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.2.4.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.2.4.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.2.4.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.2.4.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.2.4.18" }, { "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.4.20" }, { "model": "tor", "scope": "eq", "trust": 0.6, "vendor": "tor", "version": "0.2.4.19" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-00091" }, { "db": "JVNDB", "id": "JVNDB-2013-005865" }, { "db": "CNNVD", "id": "CNNVD-201401-371" }, { "db": "NVD", "id": "CVE-2013-7295" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:torproject:tor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005865" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "64651" } ], "trust": 0.3 }, "cve": "CVE-2013-7295", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "CVE-2013-7295", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2014-00091", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-7295", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2013-7295", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2014-00091", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201401-371", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-00091" }, { "db": "JVNDB", "id": "JVNDB-2013-005865" }, { "db": "CNNVD", "id": "CNNVD-201401-371" }, { "db": "NVD", "id": "CVE-2013-7295" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors. Tor (The Onion Router) is an implementation of the second generation onion routing, which is mainly used to access the Internet anonymously. \nThere are security holes in Tor. An attacker could use this vulnerability to bypass security restrictions. There are vulnerabilities in Tor 0.2.4.19. Other versions may also be affected. This may aid in further attacks. \n \n Update to version 0.2.4.22 solves these major and security problems:\n \n - Block authority signing keys that were used on authorities vulnerable\n to the heartbleed bug in OpenSSL (CVE-2014-0160). \n \n - Fix a memory leak that could occur if a microdescriptor parse fails\n during the tokenizing step. \n \n - The relay ciphersuite list is now generated automatically based on\n uniform criteria, and includes all OpenSSL ciphersuites with acceptable\n strength and forward secrecy. \n \n - Relays now trust themselves to have a better view than clients of\n which TLS ciphersuites are better than others. \n \n - Clients now try to advertise the same list of ciphersuites as\n Firefox 28. \n \n For other changes see the upstream change log\n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7295\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160\n http://advisories.mageia.org/MGASA-2014-0059.html\n http://advisories.mageia.org/MGASA-2014-0256.html\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 1/X86_64:\n 77035fd2ff3c6df5effbaf9ee78bdaf4 mbs1/x86_64/tor-0.2.4.22-1.mbs1.x86_64.rpm \n cccaec1a8425ebfce0bb7d8057d38d6e mbs1/SRPMS/tor-0.2.4.22-1.mbs1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/en/support/security/advisories/\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niD8DBQFTmDAPmqjQ0CJFipgRAqq4AJ9ZIEn/fqUynENotuSA2kTLnKwpJgCgkh59\nssWQCdn4l3H2KyxX+IQBsxw=\n=fSis\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2013-7295" }, { "db": "JVNDB", "id": "JVNDB-2013-005865" }, { "db": "CNVD", "id": "CNVD-2014-00091" }, { "db": "CNNVD", "id": "CNNVD-201401-078" }, { "db": "BID", "id": "64651" }, { "db": "PACKETSTORM", "id": "127069" } ], "trust": 3.06 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-7295", "trust": 2.8 }, { "db": "BID", "id": "64651", "trust": 1.5 }, { "db": "JVNDB", "id": "JVNDB-2013-005865", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2014-00091", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201401-078", "trust": 0.6 }, { "db": "MLIST", "id": "[TOR-TALK] 20131223 TOR 0.2.4.20 IS RELEASED", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201401-371", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "127069", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-00091" }, { "db": "BID", "id": "64651" }, { "db": "JVNDB", "id": "JVNDB-2013-005865" }, { "db": "PACKETSTORM", "id": "127069" }, { "db": "CNNVD", "id": "CNNVD-201401-078" }, { "db": "CNNVD", "id": "CNNVD-201401-371" }, { "db": "NVD", "id": "CVE-2013-7295" } ] }, "id": "VAR-201401-0517", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2014-00091" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-00091" } ] }, "last_update_date": "2024-11-23T20:17:03.235000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[tor-talk] Tor 0.2.4.20 is released", "trust": 0.8, "url": "https://lists.torproject.org/pipermail/tor-talk/2013-December/031483.html" }, { "title": "Tor random number generation vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/42181" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-00091" }, { "db": "JVNDB", "id": "JVNDB-2013-005865" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005865" }, { "db": "NVD", "id": "CVE-2013-7295" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://lists.torproject.org/pipermail/tor-talk/2013-december/031483.html" }, { "trust": 1.2, "url": "http://www.securityfocus.com/bid/64651" }, { "trust": 1.0, "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00095.html" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-7295" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-7295" }, { "trust": 0.3, "url": "https://www.torproject.org/index.html.en" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-7295" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0160" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/advisories/" }, { "trust": 0.1, "url": "http://advisories.mageia.org/mgasa-2014-0059.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0160" }, { "trust": 0.1, "url": "http://advisories.mageia.org/mgasa-2014-0256.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-00091" }, { "db": "BID", "id": "64651" }, { "db": "JVNDB", "id": "JVNDB-2013-005865" }, { "db": "PACKETSTORM", "id": "127069" }, { "db": "CNNVD", "id": "CNNVD-201401-078" }, { "db": "CNNVD", "id": "CNNVD-201401-371" }, { "db": "NVD", "id": "CVE-2013-7295" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2014-00091" }, { "db": "BID", "id": "64651" }, { "db": "JVNDB", "id": "JVNDB-2013-005865" }, { "db": "PACKETSTORM", "id": "127069" }, { "db": "CNNVD", "id": "CNNVD-201401-078" }, { "db": "CNNVD", "id": "CNNVD-201401-371" }, { "db": "NVD", "id": "CVE-2013-7295" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-01-08T00:00:00", "db": "CNVD", "id": "CNVD-2014-00091" }, { "date": "2013-12-23T00:00:00", "db": "BID", "id": "64651" }, { "date": "2014-01-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005865" }, { "date": "2014-06-12T13:43:49", "db": "PACKETSTORM", "id": "127069" }, { "date": "2013-12-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201401-078" }, { "date": "2014-01-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201401-371" }, { "date": "2014-01-17T21:55:14.613000", "db": "NVD", "id": "CVE-2013-7295" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-01-08T00:00:00", "db": "CNVD", "id": "CNVD-2014-00091" }, { "date": "2014-06-11T19:35:00", "db": "BID", "id": "64651" }, { "date": "2014-01-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005865" }, { "date": "2014-01-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201401-078" }, { "date": "2014-01-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201401-371" }, { "date": "2024-11-21T02:00:40.880000", "db": "NVD", "id": "CVE-2013-7295" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "64651" }, { "db": "CNNVD", "id": "CNNVD-201401-078" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor Vulnerability bypasses cryptographic protection mechanisms", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005865" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201401-371" } ], "trust": 0.6 } }
var-201112-0165
Vulnerability from variot
Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port. Tor is prone to an information disclosure vulnerability. Successful exploits will allow attackers to obtain sensitive information to launch further attacks. Versions prior to Tor 0.2.2.24 are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201112-0165", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.2.1.29" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.0.32" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.0.30" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.9" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.8" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.7" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.6" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.5" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.4" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.3" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.2" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.10" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.1" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.28" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.27" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.33" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.35" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.18" }, { "model": "tor", "scope": "lte", "trust": 1.0, "vendor": "tor", "version": "0.2.2.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.34" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.29" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.4" }, { "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.24-alpha" }, { "model": "tor", "scope": "eq", "trust": 0.6, "vendor": "tor", "version": "0.2.2.23" }, { "model": ".21-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".20-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".19-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".18-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".17-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".16-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".15-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".14-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.35" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.34" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.33" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.32" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.31" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.214" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.123" }, { "model": ".5-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".4-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".3-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".2-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".1-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.118" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.1.30" }, { "model": "alpha-cvs", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.2.1" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.224" } ], "sources": [ { "db": "BID", "id": "51283" }, { "db": "JVNDB", "id": "JVNDB-2011-003517" }, { "db": "CNNVD", "id": "CNNVD-201112-432" }, { "db": "NVD", "id": "CVE-2011-4896" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:torproject:tor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003517" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "51283" } ], "trust": 0.3 }, "cve": "CVE-2011-4896", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2011-4896", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-4896", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-4896", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201112-432", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003517" }, { "db": "CNNVD", "id": "CNNVD-201112-432" }, { "db": "NVD", "id": "CVE-2011-4896" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port. Tor is prone to an information disclosure vulnerability. \nSuccessful exploits will allow attackers to obtain sensitive information to launch further attacks. \nVersions prior to Tor 0.2.2.24 are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2011-4896" }, { "db": "JVNDB", "id": "JVNDB-2011-003517" }, { "db": "BID", "id": "51283" } ], "trust": 1.89 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-4896", "trust": 2.7 }, { "db": "JVNDB", "id": "JVNDB-2011-003517", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201112-432", "trust": 0.6 }, { "db": "BID", "id": "51283", "trust": 0.3 } ], "sources": [ { "db": "BID", "id": "51283" }, { "db": "JVNDB", "id": "JVNDB-2011-003517" }, { "db": "CNNVD", "id": "CNNVD-201112-432" }, { "db": "NVD", "id": "CVE-2011-4896" } ] }, "id": "VAR-201112-0165", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4086538599999999 }, "last_update_date": "2024-11-23T22:56:48.886000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Tor 0.2.2.24-alpha is out", "trust": 0.8, "url": "https://blog.torproject.org/blog/tor-02224-alpha-out" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003517" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003517" }, { "db": "NVD", "id": "CVE-2011-4896" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://blog.torproject.org/blog/tor-02224-alpha-out" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4896" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4896" }, { "trust": 0.3, "url": "http://www.torproject.org/index.html.en" } ], "sources": [ { "db": "BID", "id": "51283" }, { "db": "JVNDB", "id": "JVNDB-2011-003517" }, { "db": "CNNVD", "id": "CNNVD-201112-432" }, { "db": "NVD", "id": "CVE-2011-4896" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "51283" }, { "db": "JVNDB", "id": "JVNDB-2011-003517" }, { "db": "CNNVD", "id": "CNNVD-201112-432" }, { "db": "NVD", "id": "CVE-2011-4896" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-04-12T00:00:00", "db": "BID", "id": "51283" }, { "date": "2011-12-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003517" }, { "date": "2011-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201112-432" }, { "date": "2011-12-23T03:59:22.130000", "db": "NVD", "id": "CVE-2011-4896" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-04-12T00:00:00", "db": "BID", "id": "51283" }, { "date": "2011-12-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003517" }, { "date": "2011-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201112-432" }, { "date": "2024-11-21T01:33:15.350000", "db": "NVD", "id": "CVE-2011-4896" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201112-432" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor Vulnerability in which important information is obtained", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003517" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201112-432" } ], "trust": 0.6 } }
var-201001-0712
Vulnerability from variot
Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations. Tor (The Onion Router) is an implementation of the second generation of onion routing software, through which users can communicate anonymously over the Internet. If the user submits a specially made query request to the bridge official directory, the directory authority will reveal all the tracked bridge identities in the response of dbg-stability.txt, which is an information disclosure. Tor is prone to a remote information-disclosure vulnerability. Exploits will allow attackers to obtain sensitive information that can help them launch further attacks. NOTE: Since certain Tor infrastructures were compromised, new version 3 identity keys have been issued. Versions prior to Tor 0.2.1.22 are vulnerable. ----------------------------------------------------------------------
Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/
TITLE: Tor Directory Authorities Directory Queries Information Disclosure
SECUNIA ADVISORY ID: SA38198
VERIFY ADVISORY: http://secunia.com/advisories/38198/
DESCRIPTION: A security issue has been reported in Tor, which can be exploited by malicious people to disclose potentially sensitive information.
SOLUTION: Update to version 0.2.1.22.
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: http://permalink.gmane.org/gmane.network.onion-routing.announce/30
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201001-0712", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.9" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.8" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.7" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.6" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.5" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.4" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.3" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.2" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.10" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.1" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.1_alpha-cvs" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5_alpha" }, { "model": "tor", "scope": "eq", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.7-alpha" }, { "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.x" }, { "model": "tor", "scope": "eq", "trust": 0.6, "vendor": "tor", "version": "0.2.x" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.35" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.34" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.33" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.32" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.31" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.214" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.123" }, { "model": ".5-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".4-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".3-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".2-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".1-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.118" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.1.21" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.1.20" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.2.15" }, { "model": "alpha-cvs", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.2.1" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.1.22" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-5332" }, { "db": "BID", "id": "37901" }, { "db": "JVNDB", "id": "JVNDB-2010-005250" }, { "db": "CNNVD", "id": "CNNVD-201001-253" }, { "db": "NVD", "id": "CVE-2010-0383" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:torproject:tor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-005250" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Roger Dingledine", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-253" } ], "trust": 0.6 }, "cve": "CVE-2010-0383", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2010-0383", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2010-5332", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2010-0383", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2010-0383", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2010-5332", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201001-253", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-5332" }, { "db": "JVNDB", "id": "JVNDB-2010-005250" }, { "db": "CNNVD", "id": "CNNVD-201001-253" }, { "db": "NVD", "id": "CVE-2010-0383" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations. Tor (The Onion Router) is an implementation of the second generation of onion routing software, through which users can communicate anonymously over the Internet. If the user submits a specially made query request to the bridge official directory, the directory authority will reveal all the tracked bridge identities in the response of dbg-stability.txt, which is an information disclosure. Tor is prone to a remote information-disclosure vulnerability. \nExploits will allow attackers to obtain sensitive information that can help them launch further attacks. \nNOTE: Since certain Tor infrastructures were compromised, new version 3 identity keys have been issued. \nVersions prior to Tor 0.2.1.22 are vulnerable. ----------------------------------------------------------------------\n\n\n\nSecunia integrated with Microsoft WSUS \nhttp://secunia.com/blog/71/\n\n\n\n----------------------------------------------------------------------\n\nTITLE:\nTor Directory Authorities Directory Queries Information Disclosure\n\nSECUNIA ADVISORY ID:\nSA38198\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/38198/\n\nDESCRIPTION:\nA security issue has been reported in Tor, which can be exploited by\nmalicious people to disclose potentially sensitive information. \n\nSOLUTION:\nUpdate to version 0.2.1.22. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://permalink.gmane.org/gmane.network.onion-routing.announce/30\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2010-0383" }, { "db": "JVNDB", "id": "JVNDB-2010-005250" }, { "db": "CNVD", "id": "CNVD-2010-5332" }, { "db": "BID", "id": "37901" }, { "db": "PACKETSTORM", "id": "85478" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2010-0383", "trust": 3.3 }, { "db": "BID", "id": "37901", "trust": 2.5 }, { "db": "SECUNIA", "id": "38198", "trust": 1.7 }, { "db": "OSVDB", "id": "61977", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2010-005250", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2010-5332", "trust": 0.6 }, { "db": "MLIST", "id": "[OR-TALK] 20100120 TOR 0.2.2.7-ALPHA IS OUT", "trust": 0.6 }, { "db": "MLIST", "id": "[OR-TALK] 20100120 RE: TOR PROJECT INFRASTRUCTURE UPDATES IN RESPONSE TO SECURITY BREACH", "trust": 0.6 }, { "db": "MLIST", "id": "[OR-ANNOUNCE] 20100121 TOR 0.2.1.22 IS RELEASED (SECURITY FIX)", "trust": 0.6 }, { "db": "MLIST", "id": "[OR-TALK] 20100120 TOR PROJECT INFRASTRUCTURE UPDATES IN RESPONSE TO SECURITY BREACH", "trust": 0.6 }, { "db": "NSFOCUS", "id": "14397", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201001-253", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "85478", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-5332" }, { "db": "BID", "id": "37901" }, { "db": "JVNDB", "id": "JVNDB-2010-005250" }, { "db": "PACKETSTORM", "id": "85478" }, { "db": "CNNVD", "id": "CNNVD-201001-253" }, { "db": "NVD", "id": "CVE-2010-0383" } ] }, "id": "VAR-201001-0712", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2010-5332" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-5332" } ] }, "last_update_date": "2024-11-23T22:09:13.681000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.torproject.org/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-005250" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-005250" }, { "db": "NVD", "id": "CVE-2010-0383" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "http://www.securityfocus.com/bid/37901" }, { "trust": 1.9, "url": "http://archives.seul.org/or/talk/jan-2010/msg00161.html" }, { "trust": 1.6, "url": "http://secunia.com/advisories/38198" }, { "trust": 1.6, "url": "http://osvdb.org/61977" }, { "trust": 1.6, "url": "http://archives.seul.org/or/talk/jan-2010/msg00165.html" }, { "trust": 1.6, "url": "http://archives.seul.org/or/talk/jan-2010/msg00162.html" }, { "trust": 1.6, "url": "http://archives.seul.org/or/announce/jan-2010/msg00000.html" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0383" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0383" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/14397" }, { "trust": 0.3, "url": "http://www.torproject.org/index.html.en" }, { "trust": 0.1, "url": "http://permalink.gmane.org/gmane.network.onion-routing.announce/30" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/blog/71/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/38198/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-5332" }, { "db": "BID", "id": "37901" }, { "db": "JVNDB", "id": "JVNDB-2010-005250" }, { "db": "PACKETSTORM", "id": "85478" }, { "db": "CNNVD", "id": "CNNVD-201001-253" }, { "db": "NVD", "id": "CVE-2010-0383" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2010-5332" }, { "db": "BID", "id": "37901" }, { "db": "JVNDB", "id": "JVNDB-2010-005250" }, { "db": "PACKETSTORM", "id": "85478" }, { "db": "CNNVD", "id": "CNNVD-201001-253" }, { "db": "NVD", "id": "CVE-2010-0383" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-01-25T00:00:00", "db": "CNVD", "id": "CNVD-2010-5332" }, { "date": "2010-01-21T00:00:00", "db": "BID", "id": "37901" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-005250" }, { "date": "2010-01-21T10:22:16", "db": "PACKETSTORM", "id": "85478" }, { "date": "2010-01-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201001-253" }, { "date": "2010-01-25T19:30:01.637000", "db": "NVD", "id": "CVE-2010-0383" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-01-25T00:00:00", "db": "CNVD", "id": "CNVD-2010-5332" }, { "date": "2015-04-13T21:03:00", "db": "BID", "id": "37901" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-005250" }, { "date": "2010-01-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201001-253" }, { "date": "2024-11-21T01:12:06.133000", "db": "NVD", "id": "CVE-2010-0383" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-253" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor official directory query request information disclosure vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2010-5332" }, { "db": "CNNVD", "id": "CNNVD-201001-253" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-253" } ], "trust": 0.6 } }
var-201709-0618
Vulnerability from variot
The rend_service_intro_established function in or/rendservice.c in Tor before 0.2.8.15, 0.2.9.x before 0.2.9.12, 0.3.0.x before 0.3.0.11, 0.3.1.x before 0.3.1.7, and 0.3.2.x before 0.3.2.1-alpha, when SafeLogging is disabled, allows attackers to obtain sensitive information by leveraging access to the log files of a hidden service, because uninitialized stack data is included in an error message about construction of an introduction point circuit. Tor Contains a vulnerability related to information disclosure from log files.Information may be obtained. Tor is an implementation of the second generation of onion routing, which is mainly used to access the Internet anonymously. Tor is prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Debian Security Advisory DSA-3993-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff October 06, 2017 https://www.debian.org/security/faq
Package : tor CVE ID : CVE-2017-0380
It was discovered that the Tor onion service could leak sensitive information to log files if the "SafeLogging" option is set to "0".
The oldstable distribution (jessie) is not affected.
For the stable distribution (stretch), this problem has been fixed in version 0.2.9.12-1.
We recommend that you upgrade your tor packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlnX+bUACgkQEMKTtsN8 Tjb5ehAAnG7JAqEQtjrUAenUy9wZtmsqA5AtFf6goHCw9uYZ0Co2rAZbRQYKeerw z9TtW/gyKZdYSmY2jd82E9rJTHfuNX7J37LIfNqb8CMLf+eW5shnqghPX+R+MfXU q99ufaKpdDrK8ZRg3ECXpvHXLyzgYvlm8KAX/6bnv0Kt6nNvE3LCDSXvDjGcGuX/ VEnfZMk6GnxlIp/op3uXPYQYKm7BrModTMx7iKoTlBwhdlxh8MwTBsrEH+aQvIUo ZCqqOdU31Av6OngBmIwnkFPq/4FjXvS/lkmpXP6y6g7RCIAc8yf72wk0lNR5OqBX 2svQyr5ZqBH3fCM9eSDUV4nBvC8xUEETZQpMZRUqlF/SJcO33Jh+R+UE3HHh1Imy ozoxnx+qiKUWoUuSXnPCetXKaWH3alJXkp2JDsmoSAVwW/VBeGylsuQ2nAeYTcOb fdpXRqrL+w/w7VXCIAJ3bCN5N8j6otRtMUAntHgXfqxx72Zk5MQrco7aiPvLzten VyKYFxQiRcBV/JFR37Unklkgf4TNxwXhgVe8M6AiVvyyRcH0v8zEKn7HX53h+fSM W27BweGIE9qpOQlo1m8XiQml/3J8aJhAbvuwRoIoiwKb9Xos6+YdxCqDOJiFArk3 ozt2+7pKmawWD3dJotVIu8tOMOC8lYdP5H0YLy6Qt3X3+zm1x3g= =7kef -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201709-0618", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "torproject", "version": "0.3.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "torproject", "version": "0.3.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "torproject", "version": "0.3.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "torproject", "version": "0.3.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "torproject", "version": "0.3.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "torproject", "version": "0.3.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "torproject", "version": "0.3.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "torproject", "version": "0.3.2" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "torproject", "version": "0.3.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "torproject", "version": "0.3.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "torproject", "version": "0.3.0.0" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "torproject", "version": "0.2.9.11" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "torproject", "version": "0.2.9.0" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.3.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.2.9.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.2.9.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.2.9.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.2.9.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.2.9.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.3.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.3.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.3.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.3.0.6" }, { "model": "tor", "scope": "lte", "trust": 1.0, "vendor": "torproject", "version": "0.2.8.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.3.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.2.9.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.2.9.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.2.9.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.2.9.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "torproject", "version": "0.3.0.5" }, { "model": "tor", "scope": null, "trust": 0.8, "vendor": "the tor", "version": null }, { "model": "tor", "scope": "lt", "trust": 0.6, "vendor": "tor", "version": "0.2.8.15" }, { "model": "tor", "scope": "eq", "trust": 0.6, "vendor": "tor", "version": "0.2.9.*,\u003c0.2.9.12" }, { "model": "tor", "scope": "eq", "trust": 0.6, "vendor": "tor", "version": "0.3.0.*,\u003c0.3.0.11" }, { "model": "tor", "scope": "eq", "trust": 0.6, "vendor": "tor", "version": "0.3.1.*,\u003c0.3.1.7" }, { "model": "0.3.2.*,\u003c0.3.2.1-alpha", "scope": null, "trust": 0.6, "vendor": "tor", "version": null }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "torproject", "version": "0.3.1.0" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "torproject", "version": "0.2.8.14" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "tor 0.3.2.1-alpha", "scope": "ne", "trust": 0.3, "vendor": "torproject", "version": null }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "torproject", "version": "0.3.1.7" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "torproject", "version": "0.3.0.11" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "torproject", "version": "0.2.9.12" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "torproject", "version": "0.2.8.15" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-34623" }, { "db": "BID", "id": "101222" }, { "db": "JVNDB", "id": "JVNDB-2017-008306" }, { "db": "CNNVD", "id": "CNNVD-201709-858" }, { "db": "NVD", "id": "CVE-2017-0380" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:torproject:tor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-008306" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "101222" } ], "trust": 0.3 }, "cve": "CVE-2017-0380", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2017-0380", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2017-34623", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2017-0380", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-0380", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2017-0380", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2017-34623", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201709-858", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-34623" }, { "db": "JVNDB", "id": "JVNDB-2017-008306" }, { "db": "CNNVD", "id": "CNNVD-201709-858" }, { "db": "NVD", "id": "CVE-2017-0380" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The rend_service_intro_established function in or/rendservice.c in Tor before 0.2.8.15, 0.2.9.x before 0.2.9.12, 0.3.0.x before 0.3.0.11, 0.3.1.x before 0.3.1.7, and 0.3.2.x before 0.3.2.1-alpha, when SafeLogging is disabled, allows attackers to obtain sensitive information by leveraging access to the log files of a hidden service, because uninitialized stack data is included in an error message about construction of an introduction point circuit. Tor Contains a vulnerability related to information disclosure from log files.Information may be obtained. Tor is an implementation of the second generation of onion routing, which is mainly used to access the Internet anonymously. Tor is prone to an information-disclosure vulnerability. \nAttackers can exploit this issue to obtain sensitive information that may aid in launching further attacks. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3993-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nOctober 06, 2017 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : tor\nCVE ID : CVE-2017-0380\n\nIt was discovered that the Tor onion service could leak sensitive\ninformation to log files if the \"SafeLogging\" option is set to \"0\". \n\nThe oldstable distribution (jessie) is not affected. \n\nFor the stable distribution (stretch), this problem has been fixed in\nversion 0.2.9.12-1. \n\nWe recommend that you upgrade your tor packages. \n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\nozt2+7pKmawWD3dJotVIu8tOMOC8lYdP5H0YLy6Qt3X3+zm1x3g=\n=7kef\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2017-0380" }, { "db": "JVNDB", "id": "JVNDB-2017-008306" }, { "db": "CNVD", "id": "CNVD-2017-34623" }, { "db": "BID", "id": "101222" }, { "db": "PACKETSTORM", "id": "144540" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-0380", "trust": 3.4 }, { "db": "SECTRACK", "id": "1039519", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2017-008306", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2017-34623", "trust": 0.6 }, { "db": "NSFOCUS", "id": "37666", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201709-858", "trust": 0.6 }, { "db": "BID", "id": "101222", "trust": 0.3 }, { "db": "PACKETSTORM", "id": "144540", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-34623" }, { "db": "BID", "id": "101222" }, { "db": "JVNDB", "id": "JVNDB-2017-008306" }, { "db": "PACKETSTORM", "id": "144540" }, { "db": "CNNVD", "id": "CNNVD-201709-858" }, { "db": "NVD", "id": "CVE-2017-0380" } ] }, "id": "VAR-201709-0618", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-34623" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-34623" } ] }, "last_update_date": "2024-11-23T21:53:47.798000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Fix log-uninitialized-stack bug in rend_service_intro_established.", "trust": 0.8, "url": "https://github.com/torproject/tor/commit/09ea89764a4d3a907808ed7d4fe42abfe64bd486" }, { "title": "Fix TROVE-2017-008: Stack disclosure in hidden services logs when SafeLogging disabled", "trust": 0.8, "url": "https://trac.torproject.org/projects/tor/ticket/23490" }, { "title": "Patch for Tor \u0027rend_service_intro_established\u0027 function sensitive information disclosure vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/106424" }, { "title": "Tor Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=74964" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-34623" }, { "db": "JVNDB", "id": "JVNDB-2017-008306" }, { "db": "CNNVD", "id": "CNNVD-201709-858" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-532", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-008306" }, { "db": "NVD", "id": "CVE-2017-0380" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://github.com/torproject/tor/commit/09ea89764a4d3a907808ed7d4fe42abfe64bd486" }, { "trust": 1.9, "url": "https://trac.torproject.org/projects/tor/ticket/23490" }, { "trust": 1.0, "url": "http://www.securitytracker.com/id/1039519" }, { "trust": 1.0, "url": "http://www.debian.org/security/2017/dsa-3993" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-0380" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-0380" }, { "trust": 0.6, "url": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-0380" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/37666" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493513" }, { "trust": 0.3, "url": "https://www.torproject.org/index.html.en" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-34623" }, { "db": "BID", "id": "101222" }, { "db": "JVNDB", "id": "JVNDB-2017-008306" }, { "db": "PACKETSTORM", "id": "144540" }, { "db": "CNNVD", "id": "CNNVD-201709-858" }, { "db": "NVD", "id": "CVE-2017-0380" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2017-34623" }, { "db": "BID", "id": "101222" }, { "db": "JVNDB", "id": "JVNDB-2017-008306" }, { "db": "PACKETSTORM", "id": "144540" }, { "db": "CNNVD", "id": "CNNVD-201709-858" }, { "db": "NVD", "id": "CVE-2017-0380" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-11-20T00:00:00", "db": "CNVD", "id": "CNVD-2017-34623" }, { "date": "2017-09-18T00:00:00", "db": "BID", "id": "101222" }, { "date": "2017-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-008306" }, { "date": "2017-10-09T15:42:49", "db": "PACKETSTORM", "id": "144540" }, { "date": "2017-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-858" }, { "date": "2017-09-18T16:29:00.207000", "db": "NVD", "id": "CVE-2017-0380" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-11-20T00:00:00", "db": "CNVD", "id": "CNVD-2017-34623" }, { "date": "2017-09-18T00:00:00", "db": "BID", "id": "101222" }, { "date": "2017-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-008306" }, { "date": "2017-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-858" }, { "date": "2024-11-21T03:02:52.303000", "db": "NVD", "id": "CVE-2017-0380" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-858" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor Vulnerable to information disclosure from log files", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-008306" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-858" } ], "trust": 0.6 } }
var-201208-0159
Vulnerability from variot
routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack. Tor (The Onion Router) is an implementation of the second generation of onion routing, which allows users to communicate anonymously over the Internet. Tor has a remote vulnerability in its implementation. Attackers can exploit vulnerabilities to obtain sensitive information. Multiple denial-of-service vulnerabilities. 2. An information-disclosure vulnerability. 3. An out-of-bounds memory-access vulnerability. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Mandriva Linux Security Advisory MDVSA-2013:132 http://www.mandriva.com/en/support/security/
Package : tor Date : April 10, 2013 Affected: Business Server 1.0
Problem Description:
Updated tor package fixes security vulnerabilities:
Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected (CVE-2011-2768).
Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values (CVE-2011-2769).
Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests (CVE-2012-3517).
The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted (1) vote document or (2) consensus document (CVE-2012-3518).
The compare_tor_addr_to_addr_policy function in or/policies.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.21-rc, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a zero-valued port field that is not properly handled during policy comparison (CVE-2012-4419).
Tor before 0.2.2.39, when waiting for a client to renegotiate, allowed it to add bytes to the input buffer, allowing a crash to be caused remotely (tor-5934, tor-6007).
Denial of Service vulnerability in Tor before 0.2.3.25, due to an error when handling SENDME cells and can be exploited to cause excessive consumption of memory resources within an entry node (SA51329, CVE-2012-5573).
The version of Tor shipped in MBS1 did not have correctly formed systemd unit and thus failed to start.
This updated version corrects this problem and restores working behaviour.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2768 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2769 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3517 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3518 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3519 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4419 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5573 https://wiki.mageia.org/en/Support/Advisories/MGAA-2012-0184 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0276 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0356
Updated Packages:
Mandriva Business Server 1/X86_64: 8cadc920e4452cd2a3551a3cb01d9fcf mbs1/x86_64/tor-0.2.2.39-1.mbs1.x86_64.rpm 7cbba7170bc4f9e6ee8409398437570c mbs1/SRPMS/tor-0.2.2.39-1.mbs1.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFRZVsDmqjQ0CJFipgRAm9IAJ9tYUVrI7u2V+7yJGNLn2OVMdOzcACgyrhf PUIroe88x4NDpj7AUyd2YP8= =x4YG -----END PGP SIGNATURE-----
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201301-03
http://security.gentoo.org/
Severity: Normal Title: Tor: Multiple vulnerabilities Date: January 08, 2013 Bugs: #432188, #434882, #444804 ID: 201301-03
Synopsis
Multiple vulnerabilities have been found in Tor, allowing attackers to cause Denial of Service or obtain sensitive information. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All Tor users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.3.25"
References
[ 1 ] CVE-2012-3517 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3517 [ 2 ] CVE-2012-3518 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3518 [ 3 ] CVE-2012-3519 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3519 [ 4 ] CVE-2012-4419 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4419 [ 5 ] CVE-2012-4922 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4922 [ 6 ] CVE-2012-5573 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5573
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201301-03.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 .
CVE-2012-3518
Avoid an uninitialised memory read when reading a vote or consensus document that has an unrecognized flavour name.
CVE-2012-3519
Try to leak less information about what relays a client is choosing to a side-channel attacker. This fixes a potential DoS issue [tor-5934, tor-6007].
For the stable distribution (squeeze), these problems have been fixed in version 0.2.2.39-1.
For the unstable distribution, these problems have been fixed in version 0.2.3.22-rc-1.
We recommend that you upgrade your tor packages. ----------------------------------------------------------------------
The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/
TITLE: Debian update for tor
SECUNIA ADVISORY ID: SA50583
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/50583/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=50583
RELEASE DATE: 2012-09-14
DISCUSS ADVISORY: http://secunia.com/advisories/50583/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/50583/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=50583
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Debian has issued an update for tor.
ORIGINAL ADVISORY: DSA-2548-1: http://www.debian.org/security/2012/dsa-2548
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201208-0159", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "lte", "trust": 1.0, "vendor": "tor", "version": "0.2.2.37" }, { "model": "tor", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.2.37" }, { "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.38" }, { "model": "tor", "scope": "eq", "trust": 0.6, "vendor": "tor", "version": "0.2.x" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.225" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.224" }, { "model": ".21-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".20-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".19-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".18-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".17-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".16-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".15-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".14-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2.34" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1x8664" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.2.38" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-4471" }, { "db": "BID", "id": "55128" }, { "db": "JVNDB", "id": "JVNDB-2012-003895" }, { "db": "CNNVD", "id": "CNNVD-201208-382" }, { "db": "NVD", "id": "CVE-2012-3519" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:torproject:tor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003895" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Arma, Asn, and Nickm", "sources": [ { "db": "BID", "id": "55128" }, { "db": "CNNVD", "id": "CNNVD-201208-382" } ], "trust": 0.9 }, "cve": "CVE-2012-3519", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2012-3519", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-3519", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-3519", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201208-382", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003895" }, { "db": "CNNVD", "id": "CNNVD-201208-382" }, { "db": "NVD", "id": "CVE-2012-3519" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack. Tor (The Onion Router) is an implementation of the second generation of onion routing, which allows users to communicate anonymously over the Internet. Tor has a remote vulnerability in its implementation. Attackers can exploit vulnerabilities to obtain sensitive information. Multiple denial-of-service vulnerabilities. \n2. An information-disclosure vulnerability. \n3. An out-of-bounds memory-access vulnerability. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n _______________________________________________________________________\n\n Mandriva Linux Security Advisory MDVSA-2013:132\n http://www.mandriva.com/en/support/security/\n _______________________________________________________________________\n\n Package : tor\n Date : April 10, 2013\n Affected: Business Server 1.0\n _______________________________________________________________________\n\n Problem Description:\n\n Updated tor package fixes security vulnerabilities:\n \n Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS\n certificate chain as part of an outgoing OR connection, which allows\n remote relays to bypass intended anonymity properties by reading this\n chain and then determining the set of entry guards that the client\n or bridge had selected (CVE-2011-2768). \n \n Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE\n and CREATE_FAST values in the Command field of a cell within an OR\n connection that it initiated, which allows remote relays to enumerate\n bridges by using these values (CVE-2011-2769). \n \n Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might\n allow remote attackers to cause a denial of service (daemon crash)\n via vectors related to failed DNS requests (CVE-2012-3517). \n \n The networkstatus_parse_vote_from_string function in routerparse.c\n in Tor before 0.2.2.38 does not properly handle an invalid flavor\n name, which allows remote attackers to cause a denial of service\n (out-of-bounds read and daemon crash) via a crafted (1) vote document\n or (2) consensus document (CVE-2012-3518). \n \n The compare_tor_addr_to_addr_policy function in or/policies.c in\n Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.21-rc, allows remote\n attackers to cause a denial of service (assertion failure and daemon\n exit) via a zero-valued port field that is not properly handled during\n policy comparison (CVE-2012-4419). \n \n Tor before 0.2.2.39, when waiting for a client to renegotiate, allowed\n it to add bytes to the input buffer, allowing a crash to be caused\n remotely (tor-5934, tor-6007). \n \n Denial of Service vulnerability in Tor before 0.2.3.25, due to an\n error when handling SENDME cells and can be exploited to cause\n excessive consumption of memory resources within an entry node\n (SA51329, CVE-2012-5573). \n \n The version of Tor shipped in MBS1 did not have correctly formed\n systemd unit and thus failed to start. \n \n This updated version corrects this problem and restores working\n behaviour. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2768\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2769\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3517\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3518\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3519\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4419\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5573\n https://wiki.mageia.org/en/Support/Advisories/MGAA-2012-0184\n https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0276\n https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0356\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 1/X86_64:\n 8cadc920e4452cd2a3551a3cb01d9fcf mbs1/x86_64/tor-0.2.2.39-1.mbs1.x86_64.rpm \n 7cbba7170bc4f9e6ee8409398437570c mbs1/SRPMS/tor-0.2.2.39-1.mbs1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/en/support/security/advisories/\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niD8DBQFRZVsDmqjQ0CJFipgRAm9IAJ9tYUVrI7u2V+7yJGNLn2OVMdOzcACgyrhf\nPUIroe88x4NDpj7AUyd2YP8=\n=x4YG\n-----END PGP SIGNATURE-----\n\n\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201301-03\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Tor: Multiple vulnerabilities\n Date: January 08, 2013\n Bugs: #432188, #434882, #444804\n ID: 201301-03\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Tor, allowing attackers to\ncause Denial of Service or obtain sensitive information. Please review the\nCVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Tor users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/tor-0.2.3.25\"\n\nReferences\n==========\n\n[ 1 ] CVE-2012-3517\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3517\n[ 2 ] CVE-2012-3518\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3518\n[ 3 ] CVE-2012-3519\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3519\n[ 4 ] CVE-2012-4419\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4419\n[ 5 ] CVE-2012-4922\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4922\n[ 6 ] CVE-2012-5573\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5573\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201301-03.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2013 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. \n\nCVE-2012-3518\n\n Avoid an uninitialised memory read when reading a vote or consensus\n document that has an unrecognized flavour name. \n\nCVE-2012-3519\n\n Try to leak less information about what relays a client is choosing to\n a side-channel attacker. This fixes a potential DoS issue\n [tor-5934, tor-6007]. \n\nFor the stable distribution (squeeze), these problems have been fixed in\nversion 0.2.2.39-1. \n\nFor the unstable distribution, these problems have been fixed in version\n0.2.3.22-rc-1. \n\nWe recommend that you upgrade your tor packages. ----------------------------------------------------------------------\n\nThe final version of the CSI 6.0 has been released. \nFind out why this is not just another Patch Management solution: http://secunia.com/blog/325/\n\n----------------------------------------------------------------------\n\nTITLE:\nDebian update for tor\n\nSECUNIA ADVISORY ID:\nSA50583\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/50583/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50583\n\nRELEASE DATE:\n2012-09-14\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/50583/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/50583/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50583\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nDebian has issued an update for tor. \n\nORIGINAL ADVISORY:\nDSA-2548-1:\nhttp://www.debian.org/security/2012/dsa-2548\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2012-3519" }, { "db": "JVNDB", "id": "JVNDB-2012-003895" }, { "db": "CNVD", "id": "CNVD-2012-4471" }, { "db": "BID", "id": "55128" }, { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "119351" }, { "db": "PACKETSTORM", "id": "116520" }, { "db": "PACKETSTORM", "id": "116554" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-3519", "trust": 3.6 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2012/08/21/6", "trust": 1.6 }, { "db": "BID", "id": "55128", "trust": 1.5 }, { "db": "SECUNIA", "id": "50583", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-003895", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2012-4471", "trust": 0.6 }, { "db": "NSFOCUS", "id": "20408", "trust": 0.6 }, { "db": "MLIST", "id": "[OSS-SECURITY] 20120821 RE: CVE REQUEST -- TOR 0.2.2.38: THREE ISSUES", "trust": 0.6 }, { "db": "MLIST", "id": "[TOR-ANNOUNCE] 20120819 TOR 0.2.2.38 IS RELEASED", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201208-382", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "121258", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "119351", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "116520", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "116554", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-4471" }, { "db": "BID", "id": "55128" }, { "db": "JVNDB", "id": "JVNDB-2012-003895" }, { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "119351" }, { "db": "PACKETSTORM", "id": "116520" }, { "db": "PACKETSTORM", "id": "116554" }, { "db": "CNNVD", "id": "CNNVD-201208-382" }, { "db": "NVD", "id": "CVE-2012-3519" } ] }, "id": "VAR-201208-0159", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2012-4471" } ], "trust": 1.00865386 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-4471" } ] }, "last_update_date": "2024-11-23T21:46:10.079000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "openSUSE-SU-2012:1068", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "title": "Tor 0.2.2.38 is released", "trust": 0.8, "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "title": "tor.git / commit - Try to clarify impact of bug 6537", "trust": 0.8, "url": "https://gitweb.torproject.org/tor.git/commit/d48cebc5e498b0ae673635f40fc57cdddab45d5b" }, { "title": "tor.git / commit - Mitigate a side-channel leak of which relays Tor chooses for a circuit", "trust": 0.8, "url": "https://gitweb.torproject.org/tor.git/commit/308f6dad20675c42b29862f4269ad1fbfb00dc9a" }, { "title": "Ticket #6537", "trust": 0.8, "url": "https://trac.torproject.org/projects/tor/ticket/6537" }, { "title": "Tor information disclosure vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/20695" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-4471" }, { "db": "JVNDB", "id": "JVNDB-2012-003895" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003895" }, { "db": "NVD", "id": "CVE-2012-3519" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://trac.torproject.org/projects/tor/ticket/6537" }, { "trust": 1.6, "url": "https://lists.torproject.org/pipermail/tor-announce/2012-august/000086.html" }, { "trust": 1.6, "url": "https://gitweb.torproject.org/tor.git/commit/d48cebc5e498b0ae673635f40fc57cdddab45d5b" }, { "trust": 1.6, "url": "https://gitweb.torproject.org/tor.git/commit/308f6dad20675c42b29862f4269ad1fbfb00dc9a" }, { "trust": 1.6, "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "trust": 1.2, "url": "http://www.securityfocus.com/bid/55128" }, { "trust": 1.1, "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "trust": 1.0, "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "trust": 1.0, "url": "http://secunia.com/advisories/50583" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3519" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3519" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/20408" }, { "trust": 0.3, "url": "http://marc.info/?l=oss-security\u0026m=134555757608675\u0026w=2" }, { "trust": 0.3, "url": "http://www.torproject.org/index.html.en" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3519" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4419" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3518" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3517" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5573" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2769" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3518" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2768" }, { "trust": 0.1, "url": "https://wiki.mageia.org/en/support/advisories/mgasa-2012-0276" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/" }, { "trust": 0.1, "url": "https://wiki.mageia.org/en/support/advisories/mgaa-2012-0184" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/advisories/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2768" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5573" }, { "trust": 0.1, "url": "https://wiki.mageia.org/en/support/advisories/mgasa-2012-0356" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2769" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4419" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3517" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4922" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3517" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5573" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3519" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4922" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3518" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4419" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50583" }, { "trust": 0.1, "url": "http://secunia.com/advisories/50583/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/50583/#comments" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/blog/325/" }, { "trust": 0.1, "url": "http://www.debian.org/security/2012/dsa-2548" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-4471" }, { "db": "BID", "id": "55128" }, { "db": "JVNDB", "id": "JVNDB-2012-003895" }, { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "119351" }, { "db": "PACKETSTORM", "id": "116520" }, { "db": "PACKETSTORM", "id": "116554" }, { "db": "CNNVD", "id": "CNNVD-201208-382" }, { "db": "NVD", "id": "CVE-2012-3519" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2012-4471" }, { "db": "BID", "id": "55128" }, { "db": "JVNDB", "id": "JVNDB-2012-003895" }, { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "119351" }, { "db": "PACKETSTORM", "id": "116520" }, { "db": "PACKETSTORM", "id": "116554" }, { "db": "CNNVD", "id": "CNNVD-201208-382" }, { "db": "NVD", "id": "CVE-2012-3519" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-08-28T00:00:00", "db": "CNVD", "id": "CNVD-2012-4471" }, { "date": "2012-08-21T00:00:00", "db": "BID", "id": "55128" }, { "date": "2012-08-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-003895" }, { "date": "2013-04-11T02:39:54", "db": "PACKETSTORM", "id": "121258" }, { "date": "2013-01-09T02:25:38", "db": "PACKETSTORM", "id": "119351" }, { "date": "2012-09-14T01:52:39", "db": "PACKETSTORM", "id": "116520" }, { "date": "2012-09-14T04:04:24", "db": "PACKETSTORM", "id": "116554" }, { "date": "2012-08-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201208-382" }, { "date": "2012-08-26T03:17:44.153000", "db": "NVD", "id": "CVE-2012-3519" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-08-28T00:00:00", "db": "CNVD", "id": "CNVD-2012-4471" }, { "date": "2015-04-13T21:39:00", "db": "BID", "id": "55128" }, { "date": "2012-10-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-003895" }, { "date": "2012-08-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201208-382" }, { "date": "2024-11-21T01:41:02.840000", "db": "NVD", "id": "CVE-2012-3519" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "121258" }, { "db": "CNNVD", "id": "CNNVD-201208-382" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor of routerlist.c Vulnerability in which important information is obtained", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003895" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201208-382" } ], "trust": 0.6 } }
var-201101-0101
Vulnerability from variot
Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors. Tor is a second generation of onion routing implementation. The TOR project team patched Tor multiple security vulnerabilities, including heap overflow allowing arbitrary code execution (CVE-2011-0427). Zlib compression processing has a denial of service vulnerability, but some key memory is not properly zero initialized before release. Causes leakage of critical memory information. Tor is prone to a heap-based buffer-overflow vulnerability, a denial-of-service vulnerability, and an information-disclosure vulnerability. ----------------------------------------------------------------------
Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM).
Request a free trial: http://secunia.com/products/corporate/vim/
TITLE: Tor Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA42907
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/42907/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=42907
RELEASE DATE: 2011-01-19
DISCUSS ADVISORY: http://secunia.com/advisories/42907/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/42907/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=42907
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A weakness and two vulnerabilities have been reported in Tor, which can be exploited by malicious, local users to disclose potentially sensitive information, and by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.
1) An unspecified error can be exploited to cause a heap-based memory corruption.
2) An error within the handling of zlib-compressed data can be exploited to cause a DoS by sending specially crafted compressed data.
3) Various functions do not properly clear keys from memory before freeing them, which may lead to the disclosure of the keys.
The weakness and the vulnerabilities are reported in versions prior to 0.2.1.29.
SOLUTION: Update to version 0.2.1.29.
PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) debuger 2) doorss 3) cypherpunks
ORIGINAL ADVISORY: http://blog.torproject.org/blog/tor-02129-released-security-patches 2) https://trac.torproject.org/projects/tor/ticket/2324 3) https://trac.torproject.org/projects/tor/ticket/2384 https://trac.torproject.org/projects/tor/ticket/2385
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
.
For more information: SA42907
SOLUTION: Apply updated packages via the apt-get package manager. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-2148-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff January 17, 2011 http://www.debian.org/security/faq
Package : tor Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2011-0427
The developers of Tor, an anonymizing overlay network for TCP, found three security issues during a security audit. The Debian Security Tracker will be updated once they're available: http://security-tracker.debian.org/tracker/source-package/tor
For the stable distribution (lenny), this problem has been fixed in version 0.2.1.29-1~lenny+1.
For the testing distribution (squeeze) and the unstable distribution (sid), this problem has been fixed in version 0.2.1.29-1.
For the experimental distribution, this problem has been fixed in version 0.2.2.21-alpha-1.
We recommend that you upgrade your tor packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk00jUQACgkQXm3vHE4uylpElQCdGeCpaq6kGaUtHXwyKbj4WjMe Uk0AoLm9PBi6oSAqFsicw4h6M9y6gCha =NFbb -----END PGP SIGNATURE----- .
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/tor < 0.2.1.30 >= 0.2.1.30
Description
Multiple vulnerabilities have been discovered in Tor. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All Tor users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.1.30"
NOTE: This is a legacy GLSA. Updates for all affected architectures are available since April 2, 2011. It is likely that your system is already no longer affected by this issue.
References
[ 1 ] CVE-2011-0015 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0015 [ 2 ] CVE-2011-0016 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0016 [ 3 ] CVE-2011-0427 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0427 [ 4 ] CVE-2011-0490 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0490 [ 5 ] CVE-2011-0491 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0491 [ 6 ] CVE-2011-0492 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0492 [ 7 ] CVE-2011-0493 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0493 [ 8 ] CVE-2011-1924 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1924
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201110-13.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201101-0101", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.7.1" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.6.1" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.6.2" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.7.3" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.7.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.33" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.32" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.2" }, { "model": "tor", "scope": "lte", "trust": 1.0, "vendor": "tor", "version": "0.2.1.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.35" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.34" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.29" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.9" }, { "model": "tor", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.1.28" }, { "model": "tor", "scope": "eq", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.21-alpha" }, { "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.x" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.1.29" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0204" }, { "db": "BID", "id": "45832" }, { "db": "JVNDB", "id": "JVNDB-2011-004109" }, { "db": "CNNVD", "id": "CNNVD-201101-213" }, { "db": "NVD", "id": "CVE-2011-0427" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:torproject:tor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004109" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "debuger, doorss and cypherpunks.", "sources": [ { "db": "BID", "id": "45832" } ], "trust": 0.3 }, "cve": "CVE-2011-0427", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2011-0427", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-0427", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-0427", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201101-213", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004109" }, { "db": "CNNVD", "id": "CNNVD-201101-213" }, { "db": "NVD", "id": "CVE-2011-0427" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors. Tor is a second generation of onion routing implementation. The TOR project team patched Tor multiple security vulnerabilities, including heap overflow allowing arbitrary code execution (CVE-2011-0427). Zlib compression processing has a denial of service vulnerability, but some key memory is not properly zero initialized before release. Causes leakage of critical memory information. Tor is prone to a heap-based buffer-overflow vulnerability, a denial-of-service vulnerability, and an information-disclosure vulnerability. ----------------------------------------------------------------------\n\n\nSecure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM). \n\nRequest a free trial: \nhttp://secunia.com/products/corporate/vim/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nTor Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA42907\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/42907/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42907\n\nRELEASE DATE:\n2011-01-19\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/42907/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/42907/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42907\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA weakness and two vulnerabilities have been reported in Tor, which\ncan be exploited by malicious, local users to disclose potentially\nsensitive information, and by malicious people to cause a DoS (Denial\nof Service) and potentially compromise a user\u0027s system. \n\n1) An unspecified error can be exploited to cause a heap-based memory\ncorruption. \n\n2) An error within the handling of zlib-compressed data can be\nexploited to cause a DoS by sending specially crafted compressed\ndata. \n\n3) Various functions do not properly clear keys from memory before\nfreeing them, which may lead to the disclosure of the keys. \n\nThe weakness and the vulnerabilities are reported in versions prior\nto 0.2.1.29. \n\nSOLUTION:\nUpdate to version 0.2.1.29. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits:\n1) debuger\n2) doorss\n3) cypherpunks\n\nORIGINAL ADVISORY:\nhttp://blog.torproject.org/blog/tor-02129-released-security-patches\n2) https://trac.torproject.org/projects/tor/ticket/2324\n3) https://trac.torproject.org/projects/tor/ticket/2384\nhttps://trac.torproject.org/projects/tor/ticket/2385\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\nFor more information:\nSA42907\n\nSOLUTION:\nApply updated packages via the apt-get package manager. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2148-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nJanuary 17, 2011 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : tor\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE ID : CVE-2011-0427\n\nThe developers of Tor, an anonymizing overlay network for TCP, found \nthree security issues during a security audit. The Debian Security\nTracker will be updated once they\u0027re available:\nhttp://security-tracker.debian.org/tracker/source-package/tor\n\nFor the stable distribution (lenny), this problem has been fixed in\nversion 0.2.1.29-1~lenny+1. \n\nFor the testing distribution (squeeze) and the unstable distribution (sid),\nthis problem has been fixed in version 0.2.1.29-1. \n\nFor the experimental distribution, this problem has been fixed in\nversion 0.2.2.21-alpha-1. \n\nWe recommend that you upgrade your tor packages. \n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.10 (GNU/Linux)\n\niEYEARECAAYFAk00jUQACgkQXm3vHE4uylpElQCdGeCpaq6kGaUtHXwyKbj4WjMe\nUk0AoLm9PBi6oSAqFsicw4h6M9y6gCha\n=NFbb\n-----END PGP SIGNATURE-----\n. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/tor \u003c 0.2.1.30 \u003e= 0.2.1.30\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Tor. Please review the\nCVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Tor users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/tor-0.2.1.30\"\n\nNOTE: This is a legacy GLSA. Updates for all affected architectures are\navailable since April 2, 2011. It is likely that your system is already\nno longer affected by this issue. \n\nReferences\n==========\n\n[ 1 ] CVE-2011-0015\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0015\n[ 2 ] CVE-2011-0016\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0016\n[ 3 ] CVE-2011-0427\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0427\n[ 4 ] CVE-2011-0490\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0490\n[ 5 ] CVE-2011-0491\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0491\n[ 6 ] CVE-2011-0492\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0492\n[ 7 ] CVE-2011-0493\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0493\n[ 8 ] CVE-2011-1924\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1924\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201110-13.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2011 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n", "sources": [ { "db": "NVD", "id": "CVE-2011-0427" }, { "db": "JVNDB", "id": "JVNDB-2011-004109" }, { "db": "CNVD", "id": "CNVD-2011-0204" }, { "db": "BID", "id": "45832" }, { "db": "PACKETSTORM", "id": "97644" }, { "db": "PACKETSTORM", "id": "97622" }, { "db": "PACKETSTORM", "id": "97616" }, { "db": "PACKETSTORM", "id": "105951" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-0427", "trust": 3.5 }, { "db": "BID", "id": "45832", "trust": 1.3 }, { "db": "SECUNIA", "id": "42907", "trust": 1.1 }, { "db": "SECUNIA", "id": "42905", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-0131", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2011-0132", "trust": 1.0 }, { "db": "SECTRACK", "id": "1024980", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2011-004109", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2011-0204", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201101-213", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "97644", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "97622", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "97616", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "105951", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0204" }, { "db": "BID", "id": "45832" }, { "db": "JVNDB", "id": "JVNDB-2011-004109" }, { "db": "PACKETSTORM", "id": "97644" }, { "db": "PACKETSTORM", "id": "97622" }, { "db": "PACKETSTORM", "id": "97616" }, { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201101-213" }, { "db": "NVD", "id": "CVE-2011-0427" } ] }, "id": "VAR-201101-0101", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2011-0204" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0204" } ] }, "last_update_date": "2024-11-23T22:09:01.975000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "tor-02129-released-security-patches", "trust": 0.8, "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "title": "Tor unexplained buffer overflow, patch for denial of service and information disclosure vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/2615" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0204" }, { "db": "JVNDB", "id": "JVNDB-2011-004109" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004109" }, { "db": "NVD", "id": "CVE-2011-0427" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.4, "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/45832" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64748" }, { "trust": 1.0, "url": "http://secunia.com/advisories/42907" }, { "trust": 1.0, "url": "http://secunia.com/advisories/42905" }, { "trust": 1.0, "url": "http://www.debian.org/security/2011/dsa-2148" }, { "trust": 1.0, "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/changelog" }, { "trust": 1.0, "url": "http://archives.seul.org/or/announce/jan-2011/msg00000.html" }, { "trust": 1.0, "url": "http://www.securitytracker.com/id?1024980" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0427" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0427" }, { "trust": 0.6, "url": "http://blog.torproject.org/blog/tor-02129-released-security-patcheshttp" }, { "trust": 0.3, "url": "http://www.torproject.org/index.html.en" }, { "trust": 0.2, "url": "http://secunia.com/products/corporate/evm/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/products/corporate/vim/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0427" }, { "trust": 0.1, "url": "https://trac.torproject.org/projects/tor/ticket/2384" }, { "trust": 0.1, "url": "https://trac.torproject.org/projects/tor/ticket/2324" }, { "trust": 0.1, "url": "http://secunia.com/advisories/42907/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42907" }, { "trust": 0.1, "url": "http://secunia.com/advisories/42907/#comments" }, { "trust": 0.1, "url": "https://trac.torproject.org/projects/tor/ticket/2385" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42905" }, { "trust": 0.1, "url": "http://www.us.debian.org/security/2011/dsa-2148" }, { "trust": 0.1, "url": "http://secunia.com/advisories/42905/#comments" }, { "trust": 0.1, "url": "http://secunia.com/advisories/42905/" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://security-tracker.debian.org/tracker/source-package/tor" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0016" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0493" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0493" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0016" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0490" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0015" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0490" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0491" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0492" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1924" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0015" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0491" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1924" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0492" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201110-13.xml" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0204" }, { "db": "BID", "id": "45832" }, { "db": "JVNDB", "id": "JVNDB-2011-004109" }, { "db": "PACKETSTORM", "id": "97644" }, { "db": "PACKETSTORM", "id": "97622" }, { "db": "PACKETSTORM", "id": "97616" }, { "db": "PACKETSTORM", "id": "105951" }, { "db": "NVD", "id": "CVE-2011-0427" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2011-0204" }, { "db": "BID", "id": "45832" }, { "db": "JVNDB", "id": "JVNDB-2011-004109" }, { "db": "PACKETSTORM", "id": "97644" }, { "db": "PACKETSTORM", "id": "97622" }, { "db": "PACKETSTORM", "id": "97616" }, { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201101-213" }, { "db": "NVD", "id": "CVE-2011-0427" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-01-18T00:00:00", "db": "CNVD", "id": "CNVD-2011-0204" }, { "date": "2011-01-17T00:00:00", "db": "BID", "id": "45832" }, { "date": "2012-03-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-004109" }, { "date": "2011-01-18T10:02:22", "db": "PACKETSTORM", "id": "97644" }, { "date": "2011-01-18T01:26:35", "db": "PACKETSTORM", "id": "97622" }, { "date": "2011-01-18T21:19:09", "db": "PACKETSTORM", "id": "97616" }, { "date": "2011-10-18T19:42:05", "db": "PACKETSTORM", "id": "105951" }, { "date": "2011-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201101-213" }, { "date": "2011-01-19T12:00:19.750000", "db": "NVD", "id": "CVE-2011-0427" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-09-06T00:00:00", "db": "CNVD", "id": "CNVD-2011-0204" }, { "date": "2015-05-07T17:14:00", "db": "BID", "id": "45832" }, { "date": "2012-03-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-004109" }, { "date": "2011-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201101-213" }, { "date": "2024-11-21T01:23:56.647000", "db": "NVD", "id": "CVE-2011-0427" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201101-213" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor Heap-based buffer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004109" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201101-213" } ], "trust": 0.6 } }
var-201001-0281
Vulnerability from variot
Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations. Tor (The Onion Router) is an implementation of the second generation of onion routing software, through which users can communicate anonymously over the Internet. If the user submits a specially made query request to the bridge official directory, the directory authority will reveal all the tracked bridge identities in the response of dbg-stability.txt, which is an information disclosure. Tor is prone to a remote information-disclosure vulnerability. Exploits will allow attackers to obtain sensitive information that can help them launch further attacks. NOTE: Since certain Tor infrastructures were compromised, new version 3 identity keys have been issued. Versions prior to Tor 0.2.1.22 are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201001-0281", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.9" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.5" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.1" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.8" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.10" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.2" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.3" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.4" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.6" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.1_alpha-cvs" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5_alpha" }, { "model": "tor", "scope": "eq", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.7-alpha" }, { "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.x" }, { "model": "tor", "scope": "eq", "trust": 0.6, "vendor": "tor", "version": "0.2.x" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.35" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.34" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.33" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.32" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.31" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.214" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.123" }, { "model": ".5-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".4-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".3-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".2-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".1-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.118" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.1.21" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.1.20" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.2.15" }, { "model": "alpha-cvs", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.2.1" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.1.22" } ], "sources": [ { "db": "NVD", "id": "CVE-2010-0383" }, { "db": "CNNVD", "id": "CNNVD-201001-253" }, { "db": "CNVD", "id": "CNVD-2010-5332" }, { "db": "JVNDB", "id": "JVNDB-2010-005250" }, { "db": "BID", "id": "37901" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2010-0383" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Roger Dingledine", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-253" } ], "trust": 0.6 }, "cve": "CVE-2010-0383", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/severity#" }, "@id": "https://www.variotdbs.pl/ref/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2010-0383", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.8, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2010-5332", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2010-0383", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201001-253", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2010-5332", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2010-0383" }, { "db": "CNNVD", "id": "CNNVD-201001-253" }, { "db": "CNVD", "id": "CNVD-2010-5332" }, { "db": "JVNDB", "id": "JVNDB-2010-005250" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations. Tor (The Onion Router) is an implementation of the second generation of onion routing software, through which users can communicate anonymously over the Internet. If the user submits a specially made query request to the bridge official directory, the directory authority will reveal all the tracked bridge identities in the response of dbg-stability.txt, which is an information disclosure. Tor is prone to a remote information-disclosure vulnerability. \nExploits will allow attackers to obtain sensitive information that can help them launch further attacks. \nNOTE: Since certain Tor infrastructures were compromised, new version 3 identity keys have been issued. \nVersions prior to Tor 0.2.1.22 are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2010-0383" }, { "db": "JVNDB", "id": "JVNDB-2010-005250" }, { "db": "CNVD", "id": "CNVD-2010-5332" }, { "db": "BID", "id": "37901" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2010-0383", "trust": 3.3 }, { "db": "BID", "id": "37901", "trust": 2.5 }, { "db": "OSVDB", "id": "61977", "trust": 1.6 }, { "db": "SECUNIA", "id": "38198", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2010-005250", "trust": 0.8 }, { "db": "MLIST", "id": "[OR-TALK] 20100120 TOR PROJECT INFRASTRUCTURE UPDATES IN RESPONSE TO SECURITY BREACH", "trust": 0.6 }, { "db": "MLIST", "id": "[OR-TALK] 20100120 RE: TOR PROJECT INFRASTRUCTURE UPDATES IN RESPONSE TO SECURITY BREACH", "trust": 0.6 }, { "db": "MLIST", "id": "[OR-TALK] 20100120 TOR 0.2.2.7-ALPHA IS OUT", "trust": 0.6 }, { "db": "MLIST", "id": "[OR-ANNOUNCE] 20100121 TOR 0.2.1.22 IS RELEASED (SECURITY FIX)", "trust": 0.6 }, { "db": "NSFOCUS", "id": "14397", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201001-253", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2010-5332", "trust": 0.6 } ], "sources": [ { "db": "NVD", "id": "CVE-2010-0383" }, { "db": "CNNVD", "id": "CNNVD-201001-253" }, { "db": "CNVD", "id": "CNVD-2010-5332" }, { "db": "JVNDB", "id": "JVNDB-2010-005250" }, { "db": "BID", "id": "37901" } ] }, "id": "VAR-201001-0281", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2010-5332" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-5332" } ] }, "last_update_date": "2021-12-17T08:08:14.210000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.torproject.org/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-005250" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.8 } ], "sources": [ { "db": "NVD", "id": "CVE-2010-0383" }, { "db": "JVNDB", "id": "JVNDB-2010-005250" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "http://www.securityfocus.com/bid/37901" }, { "trust": 1.9, "url": "http://archives.seul.org/or/talk/jan-2010/msg00161.html" }, { "trust": 1.6, "url": "http://archives.seul.org/or/talk/jan-2010/msg00165.html" }, { "trust": 1.6, "url": "http://secunia.com/advisories/38198" }, { "trust": 1.6, "url": "http://archives.seul.org/or/announce/jan-2010/msg00000.html" }, { "trust": 1.6, "url": "http://archives.seul.org/or/talk/jan-2010/msg00162.html" }, { "trust": 1.6, "url": "http://osvdb.org/61977" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0383" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0383" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/14397" }, { "trust": 0.3, "url": "http://www.torproject.org/index.html.en" } ], "sources": [ { "db": "NVD", "id": "CVE-2010-0383" }, { "db": "CNNVD", "id": "CNNVD-201001-253" }, { "db": "CNVD", "id": "CNVD-2010-5332" }, { "db": "JVNDB", "id": "JVNDB-2010-005250" }, { "db": "BID", "id": "37901" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "NVD", "id": "CVE-2010-0383" }, { "db": "CNNVD", "id": "CNNVD-201001-253" }, { "db": "CNVD", "id": "CNVD-2010-5332" }, { "db": "JVNDB", "id": "JVNDB-2010-005250" }, { "db": "BID", "id": "37901" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-01-25T19:30:00", "db": "NVD", "id": "CVE-2010-0383" }, { "date": "2010-01-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201001-253" }, { "date": "2010-01-25T00:00:00", "db": "CNVD", "id": "CNVD-2010-5332" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-005250" }, { "date": "2010-01-21T00:00:00", "db": "BID", "id": "37901" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-02-05T07:13:00", "db": "NVD", "id": "CVE-2010-0383" }, { "date": "2010-01-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201001-253" }, { "date": "2010-01-25T00:00:00", "db": "CNVD", "id": "CNVD-2010-5332" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-005250" }, { "date": "2015-04-13T21:03:00", "db": "BID", "id": "37901" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-253" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor Official Directory Query Request Information Disclosure Vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-253" }, { "db": "CNVD", "id": "CNVD-2010-5332" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-253" } ], "trust": 0.6 } }
var-201001-0283
Vulnerability from variot
Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, when functioning as a bridge directory authority, allows remote attackers to obtain sensitive information about bridge identities and bridge descriptors via a dbg-stability.txt directory query. Tor (The Onion Router) is an implementation of the second generation of onion routing, through which users can communicate anonymously over the Internet. Tor is prone to a remote information-disclosure vulnerability. Exploits will allow attackers to obtain sensitive information that can help them launch further attacks. NOTE: Since certain Tor infrastructures were compromised, new version 3 identity keys have been issued. Versions prior to Tor 0.2.1.22 are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201001-0283", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.9" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.5" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.1" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.8" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.10" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.2" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.3" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.4" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.6" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.1_alpha-cvs" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5_alpha" }, { "model": "tor", "scope": "eq", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.7-alpha" }, { "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.x" }, { "model": "tor", "scope": "eq", "trust": 0.6, "vendor": "tor", "version": "0.2.x" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.35" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.34" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.33" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.32" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.31" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.214" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.123" }, { "model": ".5-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".4-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".3-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".2-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".1-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.118" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.1.21" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.1.20" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.2.15" }, { "model": "alpha-cvs", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.2.1" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.1.22" } ], "sources": [ { "db": "NVD", "id": "CVE-2010-0385" }, { "db": "CNNVD", "id": "CNNVD-201001-255" }, { "db": "CNVD", "id": "CNVD-2010-5331" }, { "db": "JVNDB", "id": "JVNDB-2010-005252" }, { "db": "BID", "id": "37901" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2010-0385" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Roger Dingledine", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-255" } ], "trust": 0.6 }, "cve": "CVE-2010-0385", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/severity#" }, "@id": "https://www.variotdbs.pl/ref/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2010-0385", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.8, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2010-5331", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2010-0385", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201001-255", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2010-5331", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2010-0385" }, { "db": "CNNVD", "id": "CNNVD-201001-255" }, { "db": "CNVD", "id": "CNVD-2010-5331" }, { "db": "JVNDB", "id": "JVNDB-2010-005252" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, when functioning as a bridge directory authority, allows remote attackers to obtain sensitive information about bridge identities and bridge descriptors via a dbg-stability.txt directory query. Tor (The Onion Router) is an implementation of the second generation of onion routing, through which users can communicate anonymously over the Internet. Tor is prone to a remote information-disclosure vulnerability. \nExploits will allow attackers to obtain sensitive information that can help them launch further attacks. \nNOTE: Since certain Tor infrastructures were compromised, new version 3 identity keys have been issued. \nVersions prior to Tor 0.2.1.22 are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2010-0385" }, { "db": "JVNDB", "id": "JVNDB-2010-005252" }, { "db": "CNVD", "id": "CNVD-2010-5331" }, { "db": "BID", "id": "37901" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2010-0385", "trust": 3.3 }, { "db": "BID", "id": "37901", "trust": 2.5 }, { "db": "OSVDB", "id": "61865", "trust": 1.6 }, { "db": "SECUNIA", "id": "38198", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2010-005252", "trust": 0.8 }, { "db": "NSFOCUS", "id": "14397", "trust": 0.6 }, { "db": "MLIST", "id": "[OR-TALK] 20100120 TOR 0.2.2.7-ALPHA IS OUT", "trust": 0.6 }, { "db": "MLIST", "id": "[OR-ANNOUNCE] 20100121 TOR 0.2.1.22 IS RELEASED (SECURITY FIX)", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201001-255", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2010-5331", "trust": 0.6 } ], "sources": [ { "db": "NVD", "id": "CVE-2010-0385" }, { "db": "CNNVD", "id": "CNNVD-201001-255" }, { "db": "CNVD", "id": "CNVD-2010-5331" }, { "db": "JVNDB", "id": "JVNDB-2010-005252" }, { "db": "BID", "id": "37901" } ] }, "id": "VAR-201001-0283", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2010-5331" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-5331" } ] }, "last_update_date": "2021-12-17T08:08:14.005000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.torproject.org/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-005252" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.8 } ], "sources": [ { "db": "NVD", "id": "CVE-2010-0385" }, { "db": "JVNDB", "id": "JVNDB-2010-005252" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "http://www.securityfocus.com/bid/37901" }, { "trust": 1.6, "url": "http://archives.seul.org/or/talk/jan-2010/msg00162.html" }, { "trust": 1.6, "url": "http://www.osvdb.org/61865" }, { "trust": 1.6, "url": "http://archives.seul.org/or/announce/jan-2010/msg00000.html" }, { "trust": 1.6, "url": "http://secunia.com/advisories/38198" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0385" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0385" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/14397" }, { "trust": 0.3, "url": "http://www.torproject.org/index.html.en" }, { "trust": 0.3, "url": "http://archives.seul.org/or/talk/jan-2010/msg00161.html" } ], "sources": [ { "db": "NVD", "id": "CVE-2010-0385" }, { "db": "CNNVD", "id": "CNNVD-201001-255" }, { "db": "CNVD", "id": "CNVD-2010-5331" }, { "db": "JVNDB", "id": "JVNDB-2010-005252" }, { "db": "BID", "id": "37901" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "NVD", "id": "CVE-2010-0385" }, { "db": "CNNVD", "id": "CNNVD-201001-255" }, { "db": "CNVD", "id": "CNVD-2010-5331" }, { "db": "JVNDB", "id": "JVNDB-2010-005252" }, { "db": "BID", "id": "37901" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-01-25T19:30:00", "db": "NVD", "id": "CVE-2010-0385" }, { "date": "2010-01-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201001-255" }, { "date": "2010-01-25T00:00:00", "db": "CNVD", "id": "CNVD-2010-5331" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-005252" }, { "date": "2010-01-21T00:00:00", "db": "BID", "id": "37901" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-01-26T05:00:00", "db": "NVD", "id": "CVE-2010-0385" }, { "date": "2010-01-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201001-255" }, { "date": "2010-01-25T00:00:00", "db": "CNVD", "id": "CNVD-2010-5331" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-005252" }, { "date": "2015-04-13T21:03:00", "db": "BID", "id": "37901" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-255" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor Official Directory Query Request Sensitive Information Disclosure Vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-255" }, { "db": "CNVD", "id": "CNVD-2010-5331" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-255" } ], "trust": 0.6 } }
var-201106-0064
Vulnerability from variot
Buffer overflow in the policy_summarize function in or/policies.c in Tor before 0.2.1.30 allows remote attackers to cause a denial of service (directory authority crash) via a crafted policy that triggers creation of a long port list. Tor is a second generation onion routing implementation. Tor is prone to a denial-of-service vulnerability that affects directory authority. Versions prior to Tor 0.2.1.30 are vulnerable. ----------------------------------------------------------------------
Join Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria See to the presentation "The Dynamics and Threats of End-Point Software Portfolios" by Secunia's Research Analyst Director, Stefan Frei.
For more information: SA43548
SOLUTION: Apply updated packages via the yum utility ("yum update tor"). ----------------------------------------------------------------------
Meet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March).
http://secunia.com/company/events/mms_2011/
TITLE: Tor "policy_summarize()" Directory Authority Denial of Service Vulnerability
SECUNIA ADVISORY ID: SA43548
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43548/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43548
RELEASE DATE: 2011-03-20
DISCUSS ADVISORY: http://secunia.com/advisories/43548/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/43548/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=43548
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in Tor, which can be exploited by malicious people to cause a DoS (Denial of Service).
SOLUTION: Update to version 0.2.1.30.
PROVIDED AND/OR DISCOVERED BY: The vendor credits piebeer.
ORIGINAL ADVISORY: https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201110-13
http://security.gentoo.org/
Severity: High Title: Tor: Multiple vulnerabilities Date: October 18, 2011 Bugs: #351920, #359789 ID: 201110-13
Synopsis
Multiple vulnerabilities were found in Tor, the most severe of which may allow a remote attacker to execute arbitrary code.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/tor < 0.2.1.30 >= 0.2.1.30
Description
Multiple vulnerabilities have been discovered in Tor. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All Tor users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.1.30"
NOTE: This is a legacy GLSA. Updates for all affected architectures are available since April 2, 2011. It is likely that your system is already no longer affected by this issue.
References
[ 1 ] CVE-2011-0015 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0015 [ 2 ] CVE-2011-0016 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0016 [ 3 ] CVE-2011-0427 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0427 [ 4 ] CVE-2011-0490 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0490 [ 5 ] CVE-2011-0491 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0491 [ 6 ] CVE-2011-0492 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0492 [ 7 ] CVE-2011-0493 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0493 [ 8 ] CVE-2011-1924 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1924
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201110-13.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "tor", "scope": "eq", "trust": 2.5, "vendor": "tor", "version": "0.2.1.28" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 2.5, "vendor": "tor", "version": "0.2.1.27" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.2.1.20" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.2.1.21" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.2.1.22" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.5" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.9" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.6" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.7" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.4" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.3" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.8" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.5, "vendor": "tor", "version": "0.2.1.29" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.18" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.33" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.6" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.1" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.19" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.13" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.30" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.13" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.23" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.10" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.4" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.10" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.11" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.17" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.6" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.3" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.15" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.5" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.10" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.2" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.8" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.2" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1_alpha" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.32" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.12" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.8" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.1" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.16" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.20" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10_alpha" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.2" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.19" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.12" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.12" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.27" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.13" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.21" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.31" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.9" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.11" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.2" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.25" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre13" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre22" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.6" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.14" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.15" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.16" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4_alpha" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.16" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2_alpha" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.7" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre14" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.1" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.7" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.14" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre19" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.17" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.11" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre27" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.22" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.15" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.17" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.3" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre21" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.7" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.10" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3_alpha" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.14" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.21" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.26" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.20" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.3" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.5" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.23" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.28" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.6" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.15" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.5" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.2" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8.1" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.8" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.7" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre24" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.15" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.14" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.4" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.1" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.6" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.24" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre25" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.22" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.17" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.2" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.25" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.4" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.4" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.13" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.30" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.12" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.22" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.28" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.13" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.18" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.3" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.2" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre20" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.18" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.10" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.1" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.26" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.14" }, { "_id": null, "model": "tor", "scope": "lte", "trust": 1.0, "vendor": "tor", "version": "0.2.1.29" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.11" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.11" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre17" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.20" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.23" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.19" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.19" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.10" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre18" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.12" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.1" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.17" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.7" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.26" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre16" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.14" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.35" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre15" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7_alpha" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.18" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.27" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.26" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.34" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.3" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.13" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.25" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.1" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.5" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.16" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre23" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.3" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.19" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.3" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.8" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.24" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.17" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.21" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6_alpha" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.12" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.5" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.19" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.16" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.24" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.31" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.9" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.16" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.29" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.4" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.18" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.23" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre26" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.5" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.18" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.25" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.9" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.2" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.15" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.9" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.11" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.8" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.9" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.4" }, { "_id": null, "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.1.30" }, { "_id": null, "model": "tor", "scope": "eq", "trust": 0.6, "vendor": "tor", "version": "0.2.1.x" }, { "_id": null, "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "_id": null, "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.1.30" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-2212" }, { "db": "CNVD", "id": "CNVD-2011-0840" }, { "db": "BID", "id": "46618" }, { "db": "JVNDB", "id": "JVNDB-2011-004598" }, { "db": "CNNVD", "id": "CNNVD-201106-056" }, { "db": "NVD", "id": "CVE-2011-1924" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:torproject:tor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004598" } ] }, "credits": { "_id": null, "data": "piebeer", "sources": [ { "db": "BID", "id": "46618" } ], "trust": 0.3 }, "cve": "CVE-2011-1924", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2011-1924", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-1924", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-1924", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201106-056", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004598" }, { "db": "CNNVD", "id": "CNNVD-201106-056" }, { "db": "NVD", "id": "CVE-2011-1924" } ] }, "description": { "_id": null, "data": "Buffer overflow in the policy_summarize function in or/policies.c in Tor before 0.2.1.30 allows remote attackers to cause a denial of service (directory authority crash) via a crafted policy that triggers creation of a long port list. Tor is a second generation onion routing implementation. Tor is prone to a denial-of-service vulnerability that affects directory authority. \nVersions prior to Tor 0.2.1.30 are vulnerable. ----------------------------------------------------------------------\n\n\nJoin Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria\nSee to the presentation \"The Dynamics and Threats of End-Point Software Portfolios\" by Secunia\u0027s Research Analyst Director, Stefan Frei. \n\nFor more information:\nSA43548\n\nSOLUTION:\nApply updated packages via the yum utility (\"yum update tor\"). ----------------------------------------------------------------------\n\n\nMeet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March). \n\nhttp://secunia.com/company/events/mms_2011/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nTor \"policy_summarize()\" Directory Authority Denial of Service\nVulnerability\n\nSECUNIA ADVISORY ID:\nSA43548\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/43548/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43548\n\nRELEASE DATE:\n2011-03-20\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/43548/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/43548/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43548\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in Tor, which can be exploited by\nmalicious people to cause a DoS (Denial of Service). \n\nSOLUTION:\nUpdate to version 0.2.1.30. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits piebeer. \n\nORIGINAL ADVISORY:\nhttps://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201110-13\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: Tor: Multiple vulnerabilities\n Date: October 18, 2011\n Bugs: #351920, #359789\n ID: 201110-13\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities were found in Tor, the most severe of which\nmay allow a remote attacker to execute arbitrary code. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/tor \u003c 0.2.1.30 \u003e= 0.2.1.30\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Tor. Please review the\nCVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Tor users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/tor-0.2.1.30\"\n\nNOTE: This is a legacy GLSA. Updates for all affected architectures are\navailable since April 2, 2011. It is likely that your system is already\nno longer affected by this issue. \n\nReferences\n==========\n\n[ 1 ] CVE-2011-0015\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0015\n[ 2 ] CVE-2011-0016\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0016\n[ 3 ] CVE-2011-0427\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0427\n[ 4 ] CVE-2011-0490\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0490\n[ 5 ] CVE-2011-0491\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0491\n[ 6 ] CVE-2011-0492\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0492\n[ 7 ] CVE-2011-0493\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0493\n[ 8 ] CVE-2011-1924\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1924\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201110-13.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2011 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n", "sources": [ { "db": "NVD", "id": "CVE-2011-1924" }, { "db": "JVNDB", "id": "JVNDB-2011-004598" }, { "db": "CNVD", "id": "CNVD-2011-2212" }, { "db": "CNVD", "id": "CNVD-2011-0840" }, { "db": "BID", "id": "46618" }, { "db": "PACKETSTORM", "id": "102073" }, { "db": "PACKETSTORM", "id": "99519" }, { "db": "PACKETSTORM", "id": "105951" } ], "trust": 3.24 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2011-1924", "trust": 3.4 }, { "db": "BID", "id": "46618", "trust": 2.5 }, { "db": "SECUNIA", "id": "44862", "trust": 1.7 }, { "db": "SECUNIA", "id": "43548", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2011-004598", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2011-2212", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2011-0840", "trust": 0.6 }, { "db": "FEDORA", "id": "FEDORA-2011-7972", "trust": 0.6 }, { "db": "NSFOCUS", "id": "16939", "trust": 0.6 }, { "db": "MLIST", "id": "[TOR-ANNOUNCE] 20110228 TOR 0.2.1.30 IS RELEASED", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201106-056", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "102073", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "99519", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "105951", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-2212" }, { "db": "CNVD", "id": "CNVD-2011-0840" }, { "db": "BID", "id": "46618" }, { "db": "JVNDB", "id": "JVNDB-2011-004598" }, { "db": "PACKETSTORM", "id": "102073" }, { "db": "PACKETSTORM", "id": "99519" }, { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201106-056" }, { "db": "NVD", "id": "CVE-2011-1924" } ] }, "id": "VAR-201106-0064", "iot": { "_id": null, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2011-2212" }, { "db": "CNVD", "id": "CNVD-2011-0840" } ], "trust": 0.12 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 1.2 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-2212" }, { "db": "CNVD", "id": "CNVD-2011-0840" } ] }, "last_update_date": "2024-11-23T22:09:02.120000Z", "patch": { "_id": null, "data": [ { "title": "Tor 0.2.1.30 is released", "trust": 0.8, "url": "https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html" }, { "title": "Tor Directory Authority Denial of Service Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/4066" }, { "title": "Tor directory authorizes \u0027src/or/policies.c\u0027 denial of service vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/3121" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-2212" }, { "db": "CNVD", "id": "CNVD-2011-0840" }, { "db": "JVNDB", "id": "JVNDB-2011-004598" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004598" }, { "db": "NVD", "id": "CVE-2011-1924" } ] }, "references": { "_id": null, "data": [ { "trust": 2.0, "url": "https://lists.torproject.org/pipermail/tor-announce/2011-february/000000.html" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-june/061258.html" }, { "trust": 1.6, "url": "https://gitweb.torproject.org/tor.git/commit/43414eb98821d3b5c6c65181d7545ce938f82c8e" }, { "trust": 1.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705194" }, { "trust": 1.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705192" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/46618" }, { "trust": 1.6, "url": "http://secunia.com/advisories/44862" }, { "trust": 1.6, "url": "http://secunia.com/advisories/43548" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1924" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-1924" }, { "trust": 0.6, "url": "https://lists.torproject.org/pipermail/tor-announce/2011-february/000000.htmlhttps" }, { "trust": 0.6, "url": "https://lists.torproject.org/pipermail/tor-announce/2011-february/000000.htmlhttp" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/16939" }, { "trust": 0.3, "url": "http://www.torproject.org/index.html.en" }, { "trust": 0.2, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44862" }, { "trust": 0.1, "url": "http://secunia.com/advisories/44862/#comments" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://conference.first.org/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/44862/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/43548/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/43548/#comments" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/evm/" }, { "trust": 0.1, "url": "http://secunia.com/company/events/mms_2011/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43548" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0016" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0493" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0493" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0016" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0490" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0015" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0490" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0491" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0492" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1924" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0015" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0491" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1924" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0492" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201110-13.xml" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-2212" }, { "db": "CNVD", "id": "CNVD-2011-0840" }, { "db": "BID", "id": "46618" }, { "db": "JVNDB", "id": "JVNDB-2011-004598" }, { "db": "PACKETSTORM", "id": "102073" }, { "db": "PACKETSTORM", "id": "99519" }, { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201106-056" }, { "db": "NVD", "id": "CVE-2011-1924" } ] }, "sources": { "_id": null, "data": [ { "db": "CNVD", "id": "CNVD-2011-2212", "ident": null }, { "db": "CNVD", "id": "CNVD-2011-0840", "ident": null }, { "db": "BID", "id": "46618", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2011-004598", "ident": null }, { "db": "PACKETSTORM", "id": "102073", "ident": null }, { "db": "PACKETSTORM", "id": "99519", "ident": null }, { "db": "PACKETSTORM", "id": "105951", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201106-056", "ident": null }, { "db": "NVD", "id": "CVE-2011-1924", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2011-06-10T00:00:00", "db": "CNVD", "id": "CNVD-2011-2212", "ident": null }, { "date": "2011-03-02T00:00:00", "db": "CNVD", "id": "CNVD-2011-0840", "ident": null }, { "date": "2011-03-01T00:00:00", "db": "BID", "id": "46618", "ident": null }, { "date": "2012-03-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-004598", "ident": null }, { "date": "2011-06-08T06:52:16", "db": "PACKETSTORM", "id": "102073", "ident": null }, { "date": "2011-03-19T10:32:49", "db": "PACKETSTORM", "id": "99519", "ident": null }, { "date": "2011-10-18T19:42:05", "db": "PACKETSTORM", "id": "105951", "ident": null }, { "date": "2011-06-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201106-056", "ident": null }, { "date": "2011-06-14T17:55:05.313000", "db": "NVD", "id": "CVE-2011-1924", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2011-06-10T00:00:00", "db": "CNVD", "id": "CNVD-2011-2212", "ident": null }, { "date": "2011-03-02T00:00:00", "db": "CNVD", "id": "CNVD-2011-0840", "ident": null }, { "date": "2015-04-13T21:28:00", "db": "BID", "id": "46618", "ident": null }, { "date": "2012-03-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-004598", "ident": null }, { "date": "2011-06-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201106-056", "ident": null }, { "date": "2024-11-21T01:27:19.160000", "db": "NVD", "id": "CVE-2011-1924", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201106-056" } ], "trust": 0.7 }, "title": { "_id": null, "data": "Tor of policy_summarize Buffer overflow vulnerability in functions", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004598" } ], "trust": 0.8 }, "type": { "_id": null, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201106-056" } ], "trust": 0.6 } }
var-201101-0395
Vulnerability from variot
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha makes calls to Libevent within Libevent log handlers, which might allow remote attackers to cause a denial of service (daemon crash) via vectors that trigger certain log messages. Tor is a second generation of onion routing implementation. Versions prior to Tor 0.2.1.29 and versions prior to 0.2.2.21-alpha can be called Libevent in the Libevent Log Processor. Tor is prone to multiple denial-of-service vulnerabilities. Attackers can exploit these issues to crash the affected computer, denying service to legitimate users. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201110-13
http://security.gentoo.org/
Severity: High Title: Tor: Multiple vulnerabilities Date: October 18, 2011 Bugs: #351920, #359789 ID: 201110-13
Synopsis
Multiple vulnerabilities were found in Tor, the most severe of which may allow a remote attacker to execute arbitrary code.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/tor < 0.2.1.30 >= 0.2.1.30
Description
Multiple vulnerabilities have been discovered in Tor. Please review the CVE identifiers referenced below for details.
Impact
A remote unauthenticated attacker may be able to execute arbitrary code with the privileges of the Tor process or create a Denial of Service.
Workaround
There is no known workaround at this time.
Resolution
All Tor users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.1.30"
NOTE: This is a legacy GLSA. Updates for all affected architectures are available since April 2, 2011. It is likely that your system is already no longer affected by this issue.
References
[ 1 ] CVE-2011-0015 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0015 [ 2 ] CVE-2011-0016 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0016 [ 3 ] CVE-2011-0427 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0427 [ 4 ] CVE-2011-0490 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0490 [ 5 ] CVE-2011-0491 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0491 [ 6 ] CVE-2011-0492 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0492 [ 7 ] CVE-2011-0493 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0493 [ 8 ] CVE-2011-1924 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1924
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201110-13.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201101-0395", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.20" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.27" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.33" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.32" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.2" }, { "model": "tor", "scope": "lte", "trust": 1.0, "vendor": "tor", "version": "0.2.1.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.35" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.34" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.29" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.9" }, { "model": "tor", "scope": "eq", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.21-alpha" }, { "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.x" }, { "model": "tor", "scope": "lt", "trust": 0.6, "vendor": "tor", "version": "0.2.1.29" }, { "model": ".20-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".19-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".18-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".17-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".16-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".15-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".14-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.1.28" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": ".21-alpha", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.1.29" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0307" }, { "db": "BID", "id": "45953" }, { "db": "JVNDB", "id": "JVNDB-2011-004134" }, { "db": "CNNVD", "id": "CNNVD-201101-225" }, { "db": "NVD", "id": "CVE-2011-0490" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:torproject:tor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004134" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor", "sources": [ { "db": "BID", "id": "45953" } ], "trust": 0.3 }, "cve": "CVE-2011-0490", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2011-0490", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-0490", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-0490", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201101-225", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004134" }, { "db": "CNNVD", "id": "CNNVD-201101-225" }, { "db": "NVD", "id": "CVE-2011-0490" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha makes calls to Libevent within Libevent log handlers, which might allow remote attackers to cause a denial of service (daemon crash) via vectors that trigger certain log messages. Tor is a second generation of onion routing implementation. Versions prior to Tor 0.2.1.29 and versions prior to 0.2.2.21-alpha can be called Libevent in the Libevent Log Processor. Tor is prone to multiple denial-of-service vulnerabilities. \nAttackers can exploit these issues to crash the affected computer, denying service to legitimate users. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201110-13\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: Tor: Multiple vulnerabilities\n Date: October 18, 2011\n Bugs: #351920, #359789\n ID: 201110-13\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities were found in Tor, the most severe of which\nmay allow a remote attacker to execute arbitrary code. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/tor \u003c 0.2.1.30 \u003e= 0.2.1.30\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Tor. Please review the\nCVE identifiers referenced below for details. \n\nImpact\n======\n\nA remote unauthenticated attacker may be able to execute arbitrary code\nwith the privileges of the Tor process or create a Denial of Service. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Tor users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/tor-0.2.1.30\"\n\nNOTE: This is a legacy GLSA. Updates for all affected architectures are\navailable since April 2, 2011. It is likely that your system is already\nno longer affected by this issue. \n\nReferences\n==========\n\n[ 1 ] CVE-2011-0015\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0015\n[ 2 ] CVE-2011-0016\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0016\n[ 3 ] CVE-2011-0427\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0427\n[ 4 ] CVE-2011-0490\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0490\n[ 5 ] CVE-2011-0491\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0491\n[ 6 ] CVE-2011-0492\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0492\n[ 7 ] CVE-2011-0493\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0493\n[ 8 ] CVE-2011-1924\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1924\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201110-13.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2011 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n", "sources": [ { "db": "NVD", "id": "CVE-2011-0490" }, { "db": "JVNDB", "id": "JVNDB-2011-004134" }, { "db": "CNVD", "id": "CNVD-2011-0307" }, { "db": "BID", "id": "45953" }, { "db": "PACKETSTORM", "id": "105951" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-0490", "trust": 3.4 }, { "db": "BID", "id": "45953", "trust": 1.3 }, { "db": "JVNDB", "id": "JVNDB-2011-004134", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2011-0307", "trust": 0.6 }, { "db": "MLIST", "id": "[OR-ANNOUNCE] 20110117 TOR 0.2.1.29 IS RELEASED (SECURITY PATCHES)", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201101-225", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "105951", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0307" }, { "db": "BID", "id": "45953" }, { "db": "JVNDB", "id": "JVNDB-2011-004134" }, { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201101-225" }, { "db": "NVD", "id": "CVE-2011-0490" } ] }, "id": "VAR-201101-0395", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2011-0307" } ], "trust": 1.00865386 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0307" } ] }, "last_update_date": "2024-11-23T22:09:02.176000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "tor-02129-released-security-patches", "trust": 0.8, "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "title": "Tor calls a patch for the Libevent vulnerability in the Libevent log processor", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/2710" }, { "title": "vidalia-bundle-0.2.1.29-0.2.10-ppc-1", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=37089" }, { "title": "vidalia-bundle-0.2.1.29-0.2.10-i386-1", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=37088" }, { "title": "tor-0.2.1.29-win32", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=37087" }, { "title": "tor-0.2.1.29", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=37086" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0307" }, { "db": "JVNDB", "id": "JVNDB-2011-004134" }, { "db": "CNNVD", "id": "CNNVD-201101-225" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-DesignError", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004134" }, { "db": "NVD", "id": "CVE-2011-0490" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/changelog" }, { "trust": 1.9, "url": "https://trac.torproject.org/projects/tor/ticket/2190" }, { "trust": 1.9, "url": "http://archives.seul.org/or/announce/jan-2011/msg00000.html" }, { "trust": 1.9, "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64889" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/45953" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0490" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0490" }, { "trust": 0.3, "url": "https://trac.torproject.org/projects/tor/ticket/2326" }, { "trust": 0.3, "url": "https://trac.torproject.org/projects/tor/ticket/2352" }, { "trust": 0.3, "url": "https://trac.torproject.org/projects/tor/ticket/2324" }, { "trust": 0.3, "url": "http://www.torproject.org/index.html.en" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0016" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0493" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0493" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0016" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0490" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0015" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0490" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0491" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0492" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1924" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0015" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0491" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1924" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0492" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201110-13.xml" } ], "sources": [ { "db": "BID", "id": "45953" }, { "db": "JVNDB", "id": "JVNDB-2011-004134" }, { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201101-225" }, { "db": "NVD", "id": "CVE-2011-0490" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2011-0307" }, { "db": "BID", "id": "45953" }, { "db": "JVNDB", "id": "JVNDB-2011-004134" }, { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201101-225" }, { "db": "NVD", "id": "CVE-2011-0490" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-01-24T00:00:00", "db": "CNVD", "id": "CNVD-2011-0307" }, { "date": "2011-01-21T00:00:00", "db": "BID", "id": "45953" }, { "date": "2012-03-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-004134" }, { "date": "2011-10-18T19:42:05", "db": "PACKETSTORM", "id": "105951" }, { "date": "2011-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201101-225" }, { "date": "2011-01-19T12:00:19.920000", "db": "NVD", "id": "CVE-2011-0490" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-01-24T00:00:00", "db": "CNVD", "id": "CNVD-2011-0307" }, { "date": "2015-05-07T17:19:00", "db": "BID", "id": "45953" }, { "date": "2012-03-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-004134" }, { "date": "2011-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201101-225" }, { "date": "2024-11-21T01:24:07.427000", "db": "NVD", "id": "CVE-2011-0490" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201101-225" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004134" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "design error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201101-225" } ], "trust": 0.6 } }
var-201101-0385
Vulnerability from variot
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha might allow remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors related to malformed router caches and improper handling of integer values. Tor is a second generation of onion routing implementation. Tor is prone to multiple denial-of-service vulnerabilities. Attackers can exploit these issues to crash the affected computer, denying service to legitimate users. These issues affect versions prior to Tor 0.2.1.29, 0.2.2, and 0.2.2.21-alpha. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201110-13
http://security.gentoo.org/
Severity: High Title: Tor: Multiple vulnerabilities Date: October 18, 2011 Bugs: #351920, #359789 ID: 201110-13
Synopsis
Multiple vulnerabilities were found in Tor, the most severe of which may allow a remote attacker to execute arbitrary code.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/tor < 0.2.1.30 >= 0.2.1.30
Description
Multiple vulnerabilities have been discovered in Tor. Please review the CVE identifiers referenced below for details.
Impact
A remote unauthenticated attacker may be able to execute arbitrary code with the privileges of the Tor process or create a Denial of Service.
Workaround
There is no known workaround at this time.
Resolution
All Tor users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.1.30"
NOTE: This is a legacy GLSA. Updates for all affected architectures are available since April 2, 2011. It is likely that your system is already no longer affected by this issue.
References
[ 1 ] CVE-2011-0015 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0015 [ 2 ] CVE-2011-0016 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0016 [ 3 ] CVE-2011-0427 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0427 [ 4 ] CVE-2011-0490 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0490 [ 5 ] CVE-2011-0491 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0491 [ 6 ] CVE-2011-0492 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0492 [ 7 ] CVE-2011-0493 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0493 [ 8 ] CVE-2011-1924 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1924
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201110-13.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201101-0385", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.27" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.33" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.32" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.2" }, { "model": "tor", "scope": "lte", "trust": 1.0, "vendor": "tor", "version": "0.2.1.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.35" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.34" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.29" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.9" }, { "model": "tor", "scope": "eq", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.21-alpha" }, { "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.x" }, { "model": "tor", "scope": "lt", "trust": 0.6, "vendor": "tor", "version": "0.2.1.29" }, { "model": ".20-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".19-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".18-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".17-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".16-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".15-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".14-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.1.28" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": ".21-alpha", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.1.29" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0310" }, { "db": "BID", "id": "45953" }, { "db": "JVNDB", "id": "JVNDB-2011-004137" }, { "db": "CNNVD", "id": "CNNVD-201101-222" }, { "db": "NVD", "id": "CVE-2011-0493" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:torproject:tor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004137" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor", "sources": [ { "db": "BID", "id": "45953" } ], "trust": 0.3 }, "cve": "CVE-2011-0493", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2011-0493", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-0493", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-0493", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201101-222", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004137" }, { "db": "CNNVD", "id": "CNNVD-201101-222" }, { "db": "NVD", "id": "CVE-2011-0493" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha might allow remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors related to malformed router caches and improper handling of integer values. Tor is a second generation of onion routing implementation. Tor is prone to multiple denial-of-service vulnerabilities. \nAttackers can exploit these issues to crash the affected computer, denying service to legitimate users. \nThese issues affect versions prior to Tor 0.2.1.29, 0.2.2, and 0.2.2.21-alpha. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201110-13\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: Tor: Multiple vulnerabilities\n Date: October 18, 2011\n Bugs: #351920, #359789\n ID: 201110-13\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities were found in Tor, the most severe of which\nmay allow a remote attacker to execute arbitrary code. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/tor \u003c 0.2.1.30 \u003e= 0.2.1.30\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Tor. Please review the\nCVE identifiers referenced below for details. \n\nImpact\n======\n\nA remote unauthenticated attacker may be able to execute arbitrary code\nwith the privileges of the Tor process or create a Denial of Service. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Tor users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/tor-0.2.1.30\"\n\nNOTE: This is a legacy GLSA. Updates for all affected architectures are\navailable since April 2, 2011. It is likely that your system is already\nno longer affected by this issue. \n\nReferences\n==========\n\n[ 1 ] CVE-2011-0015\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0015\n[ 2 ] CVE-2011-0016\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0016\n[ 3 ] CVE-2011-0427\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0427\n[ 4 ] CVE-2011-0490\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0490\n[ 5 ] CVE-2011-0491\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0491\n[ 6 ] CVE-2011-0492\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0492\n[ 7 ] CVE-2011-0493\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0493\n[ 8 ] CVE-2011-1924\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1924\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201110-13.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2011 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n", "sources": [ { "db": "NVD", "id": "CVE-2011-0493" }, { "db": "JVNDB", "id": "JVNDB-2011-004137" }, { "db": "CNVD", "id": "CNVD-2011-0310" }, { "db": "BID", "id": "45953" }, { "db": "PACKETSTORM", "id": "105951" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-0493", "trust": 3.4 }, { "db": "BID", "id": "45953", "trust": 1.3 }, { "db": "JVNDB", "id": "JVNDB-2011-004137", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2011-0310", "trust": 0.6 }, { "db": "MLIST", "id": "[OR-ANNOUNCE] 20110117 TOR 0.2.1.29 IS RELEASED (SECURITY PATCHES)", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201101-222", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "105951", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0310" }, { "db": "BID", "id": "45953" }, { "db": "JVNDB", "id": "JVNDB-2011-004137" }, { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201101-222" }, { "db": "NVD", "id": "CVE-2011-0493" } ] }, "id": "VAR-201101-0385", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2011-0310" } ], "trust": 1.00865386 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0310" } ] }, "last_update_date": "2024-11-23T22:09:01.931000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "tor-02129-released-security-patches", "trust": 0.8, "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "title": "Tor has a security vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/2713" }, { "title": "vidalia-bundle-0.2.1.29-0.2.10-ppc-1", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=37089" }, { "title": "vidalia-bundle-0.2.1.29-0.2.10-i386-1", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=37088" }, { "title": "tor-0.2.1.29-win32", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=37087" }, { "title": "tor-0.2.1.29", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=37086" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0310" }, { "db": "JVNDB", "id": "JVNDB-2011-004137" }, { "db": "CNNVD", "id": "CNNVD-201101-222" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-189", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004137" }, { "db": "NVD", "id": "CVE-2011-0493" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/changelog" }, { "trust": 1.9, "url": "https://trac.torproject.org/projects/tor/ticket/2352" }, { "trust": 1.9, "url": "http://archives.seul.org/or/announce/jan-2011/msg00000.html" }, { "trust": 1.9, "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64864" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/45953" }, { "trust": 0.9, "url": "https://trac.torproject.org/projects/tor/ticket/2324" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0493" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0493" }, { "trust": 0.3, "url": "https://trac.torproject.org/projects/tor/ticket/2326" }, { "trust": 0.3, "url": "https://trac.torproject.org/projects/tor/ticket/2190" }, { "trust": 0.3, "url": "http://www.torproject.org/index.html.en" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0016" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0493" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0493" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0016" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0490" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0015" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0490" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0491" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0492" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1924" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0015" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0491" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1924" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0492" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201110-13.xml" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0310" }, { "db": "BID", "id": "45953" }, { "db": "JVNDB", "id": "JVNDB-2011-004137" }, { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201101-222" }, { "db": "NVD", "id": "CVE-2011-0493" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2011-0310" }, { "db": "BID", "id": "45953" }, { "db": "JVNDB", "id": "JVNDB-2011-004137" }, { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201101-222" }, { "db": "NVD", "id": "CVE-2011-0493" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-01-24T00:00:00", "db": "CNVD", "id": "CNVD-2011-0310" }, { "date": "2011-01-21T00:00:00", "db": "BID", "id": "45953" }, { "date": "2012-03-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-004137" }, { "date": "2011-10-18T19:42:05", "db": "PACKETSTORM", "id": "105951" }, { "date": "2011-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201101-222" }, { "date": "2011-01-19T12:00:21.343000", "db": "NVD", "id": "CVE-2011-0493" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-01-24T00:00:00", "db": "CNVD", "id": "CNVD-2011-0310" }, { "date": "2015-05-07T17:19:00", "db": "BID", "id": "45953" }, { "date": "2012-03-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-004137" }, { "date": "2011-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201101-222" }, { "date": "2024-11-21T01:24:07.970000", "db": "NVD", "id": "CVE-2011-0493" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201101-222" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004137" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "digital error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201101-222" } ], "trust": 0.6 } }
var-201112-0163
Vulnerability from variot
Tor before 0.2.2.34, when configured as a bridge, uses direct DirPort access instead of a Tor TLS connection for a directory fetch, which makes it easier for remote attackers to enumerate bridges by observing DirPort connections. Tor is prone to a bridge enumeration weakness. Successful exploits will allow attackers to obtain sensitive information to launch further attacks. Versions prior to Tor 0.2.2.34 are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201112-0163", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.2.31" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.2.30" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.1.24" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.9" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.8" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.7" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.6" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.5" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.4" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.3" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.2" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.10" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.1" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.33" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.32" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.35" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.34" }, { "model": "tor", "scope": "lte", "trust": 1.0, "vendor": "tor", "version": "0.2.2.33" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.29" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.32" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.29" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.29" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.4" }, { "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.34" }, { "model": ".21-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".20-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".19-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".18-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".17-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".16-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".15-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".14-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.35" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.34" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.33" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.32" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.31" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.214" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.123" }, { "model": ".5-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".4-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".3-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".2-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".1-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.118" }, { "model": "alpha-cvs", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.2.1" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.2.34" } ], "sources": [ { "db": "BID", "id": "51278" }, { "db": "JVNDB", "id": "JVNDB-2011-003515" }, { "db": "CNNVD", "id": "CNNVD-201112-430" }, { "db": "NVD", "id": "CVE-2011-4894" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:torproject:tor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003515" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "51278" } ], "trust": 0.3 }, "cve": "CVE-2011-4894", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2011-4894", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-4894", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-4894", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201112-430", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003515" }, { "db": "CNNVD", "id": "CNNVD-201112-430" }, { "db": "NVD", "id": "CVE-2011-4894" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor before 0.2.2.34, when configured as a bridge, uses direct DirPort access instead of a Tor TLS connection for a directory fetch, which makes it easier for remote attackers to enumerate bridges by observing DirPort connections. Tor is prone to a bridge enumeration weakness. \nSuccessful exploits will allow attackers to obtain sensitive information to launch further attacks. \nVersions prior to Tor 0.2.2.34 are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2011-4894" }, { "db": "JVNDB", "id": "JVNDB-2011-003515" }, { "db": "BID", "id": "51278" } ], "trust": 1.89 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-4894", "trust": 2.7 }, { "db": "JVNDB", "id": "JVNDB-2011-003515", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201112-430", "trust": 0.6 }, { "db": "BID", "id": "51278", "trust": 0.3 } ], "sources": [ { "db": "BID", "id": "51278" }, { "db": "JVNDB", "id": "JVNDB-2011-003515" }, { "db": "CNNVD", "id": "CNNVD-201112-430" }, { "db": "NVD", "id": "CVE-2011-4894" } ] }, "id": "VAR-201112-0163", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4086538599999999 }, "last_update_date": "2024-11-23T22:56:48.915000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Tor 0.2.2.34 is released (security patches)", "trust": 0.8, "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003515" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003515" }, { "db": "NVD", "id": "CVE-2011-4894" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4894" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4894" }, { "trust": 0.3, "url": "http://www.torproject.org/index.html.en" } ], "sources": [ { "db": "BID", "id": "51278" }, { "db": "JVNDB", "id": "JVNDB-2011-003515" }, { "db": "CNNVD", "id": "CNNVD-201112-430" }, { "db": "NVD", "id": "CVE-2011-4894" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "51278" }, { "db": "JVNDB", "id": "JVNDB-2011-003515" }, { "db": "CNNVD", "id": "CNNVD-201112-430" }, { "db": "NVD", "id": "CVE-2011-4894" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-10-27T00:00:00", "db": "BID", "id": "51278" }, { "date": "2011-12-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003515" }, { "date": "2011-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201112-430" }, { "date": "2011-12-23T03:59:22.067000", "db": "NVD", "id": "CVE-2011-4894" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-10-27T00:00:00", "db": "BID", "id": "51278" }, { "date": "2011-12-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003515" }, { "date": "2011-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201112-430" }, { "date": "2024-11-21T01:33:13.517000", "db": "NVD", "id": "CVE-2011-4894" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201112-430" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor Enumerated bridge vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003515" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201112-430" } ], "trust": 0.6 } }
var-201112-0077
Vulnerability from variot
Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected. Tor (The Onion Router) is an implementation of the second generation of onion routing, which allows users to communicate anonymously over the Internet. Tor has security holes in its implementation that can be exploited by malicious users to disclose sensitive information. This vulnerability is caused by the client reusing a TLS certificate on some connections. Simulate a user's detection of multiple protection relays by using a user certificate identification key to determine the connection status of the user. Tor is prone to a remote information-disclosure vulnerability and a bridge enumeration weakness. Exploits will allow attackers to obtain sensitive information that can help them launch further attacks. Versions prior to Tor 0.2.2.34 are vulnerable. ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach? Fast vulnerability intelligence, threat handling, and setup in one tool.
Read the new report on the Secunia VIM: http://secunia.com/products/corporate/vim/ovum_2011_request/
TITLE: Tor TLS Certificate Reuse User De-Anonymisation Security Issue
SECUNIA ADVISORY ID: SA46634
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46634/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46634
RELEASE DATE: 2011-10-28
DISCUSS ADVISORY: http://secunia.com/advisories/46634/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/46634/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46634
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A security issue has been reported in Tor, which can be exploited by malicious people to disclose potentially sensitive information. This can be exploited to e.g. fingerprint and de-anonymise a user by e.g.
Note: Additionally, enhancement have been made to protect against bridge enumeration attacks.
SOLUTION: Update to version 0.2.2.34.
PROVIDED AND/OR DISCOVERED BY: The vendor credits frosty_un.
ORIGINAL ADVISORY: https://blog.torproject.org/blog/tor-02234-released-security-patches
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
.
Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests (CVE-2012-3517).
The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted (1) vote document or (2) consensus document (CVE-2012-3518).
routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack (CVE-2012-3519).
The compare_tor_addr_to_addr_policy function in or/policies.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.21-rc, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a zero-valued port field that is not properly handled during policy comparison (CVE-2012-4419).
Tor before 0.2.2.39, when waiting for a client to renegotiate, allowed it to add bytes to the input buffer, allowing a crash to be caused remotely (tor-5934, tor-6007).
Denial of Service vulnerability in Tor before 0.2.3.25, due to an error when handling SENDME cells and can be exploited to cause excessive consumption of memory resources within an entry node (SA51329, CVE-2012-5573).
The version of Tor shipped in MBS1 did not have correctly formed systemd unit and thus failed to start.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2768 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2769 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3517 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3518 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3519 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4419 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5573 https://wiki.mageia.org/en/Support/Advisories/MGAA-2012-0184 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0276 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0356
Updated Packages:
Mandriva Business Server 1/X86_64: 8cadc920e4452cd2a3551a3cb01d9fcf mbs1/x86_64/tor-0.2.2.39-1.mbs1.x86_64.rpm 7cbba7170bc4f9e6ee8409398437570c mbs1/SRPMS/tor-0.2.2.39-1.mbs1.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-2331-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff October 28, 2011 http://www.debian.org/security/faq
Package : tor Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2011-2768 CVE-2011-2769
It has been discovered by "frosty_un" that a design flaw in Tor, an online privacy tool, allows malicious relay servers to learn certain information that they should not be able to learn. In combination with other attacks, this issue can lead to deanonymizing the user. The Common Vulnerabilities and Exposures project has assigned CVE-2011-2768 to this issue.
In addition to fixing the above mentioned issues, the updates to oldstable and stable fix a number of less critical issues (CVE-2011-2769). Please see this posting from the Tor blog for more information: https://blog.torproject.org/blog/tor-02234-released-security-patches
For the oldstable distribution (lenny), this problem has been fixed in version 0.2.1.31-1~lenny+1. Due to technical limitations in the Debian archive scripts, the update cannot be released synchronously with the packages for stable. It will be released shortly.
For the stable distribution (squeeze), this problem has been fixed in version 0.2.1.31-1.
For the unstable and testing distributions, this problem has been fixed in version 0.2.2.34-1.
For the experimental distribution, this problem have has fixed in version 0.2.3.6-alpha-1.
We recommend that you upgrade your tor packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)
iEYEARECAAYFAk6q1UIACgkQXm3vHE4uylrH1ACg6Y7x6by9MtC6d2whbYQvf0sV qdgAoM3IeWEe985DCPmvdBDHmEQBDzpk =HWr2 -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201201-12
http://security.gentoo.org/
Severity: Normal Title: Tor: Multiple vulnerabilities Date: January 23, 2012 Bugs: #388769, #394969 ID: 201201-12
Synopsis
Multiple vulnerabilities have been found in Tor, the most severe of which may allow a remote attacker to execute arbitrary code. * An error in or/buffers.c could result in a heap-based buffer overflow (CVE-2011-2778).
Impact
A remote attacker could possibly execute arbitrary code or cause a Denial of Service.
Workaround
There is no known workaround at this time.
Resolution
All Tor users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.2.35"
References
[ 1 ] CVE-2011-2768 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2768 [ 2 ] CVE-2011-2769 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2769 [ 3 ] CVE-2011-2778 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2778
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201201-12.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201112-0077", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.9" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.8" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.7" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.6" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.5" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.4" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.3" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.2" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.10" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.1" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.33" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.32" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.35" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.34" }, { "model": "tor", "scope": "lte", "trust": 1.0, "vendor": "tor", "version": "0.2.2.33" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.29" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.32" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.29" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.29" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.4" }, { "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.34" }, { "model": "\u003c0.2.2.20-alpha", "scope": null, "trust": 0.6, "vendor": "tor", "version": null }, { "model": ".21-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".20-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".19-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".18-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".17-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".16-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".15-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".14-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.35" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.34" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.33" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.32" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.31" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.214" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.123" }, { "model": ".5-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".4-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".3-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".2-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".1-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.118" }, { "model": "alpha-cvs", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.2.1" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1x8664" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.2.34" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-5558" }, { "db": "BID", "id": "50414" }, { "db": "JVNDB", "id": "JVNDB-2011-003512" }, { "db": "NVD", "id": "CVE-2011-2768" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:torproject:tor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003512" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "frosty_un", "sources": [ { "db": "BID", "id": "50414" }, { "db": "CNNVD", "id": "CNNVD-201110-700" } ], "trust": 0.9 }, "cve": "CVE-2011-2768", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2011-2768", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2011-5558", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-2768", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-2768", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2011-5558", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201110-700", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-5558" }, { "db": "JVNDB", "id": "JVNDB-2011-003512" }, { "db": "CNNVD", "id": "CNNVD-201110-700" }, { "db": "NVD", "id": "CVE-2011-2768" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected. Tor (The Onion Router) is an implementation of the second generation of onion routing, which allows users to communicate anonymously over the Internet. Tor has security holes in its implementation that can be exploited by malicious users to disclose sensitive information. This vulnerability is caused by the client reusing a TLS certificate on some connections. Simulate a user\u0027s detection of multiple protection relays by using a user certificate identification key to determine the connection status of the user. Tor is prone to a remote information-disclosure vulnerability and a bridge enumeration weakness. \nExploits will allow attackers to obtain sensitive information that can help them launch further attacks. \nVersions prior to Tor 0.2.2.34 are vulnerable. ----------------------------------------------------------------------\n\nOvum says ad hoc tools are out-dated. The best practice approach?\nFast vulnerability intelligence, threat handling, and setup in one tool. \n\nRead the new report on the Secunia VIM:\nhttp://secunia.com/products/corporate/vim/ovum_2011_request/ \n\n----------------------------------------------------------------------\n\nTITLE:\nTor TLS Certificate Reuse User De-Anonymisation Security Issue\n\nSECUNIA ADVISORY ID:\nSA46634\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/46634/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46634\n\nRELEASE DATE:\n2011-10-28\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/46634/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/46634/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46634\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA security issue has been reported in Tor, which can be exploited by\nmalicious people to disclose potentially sensitive information. This can be exploited to e.g. \nfingerprint and de-anonymise a user by e.g. \n\nNote: Additionally, enhancement have been made to protect against\nbridge enumeration attacks. \n\nSOLUTION:\nUpdate to version 0.2.2.34. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits frosty_un. \n\nORIGINAL ADVISORY:\nhttps://blog.torproject.org/blog/tor-02234-released-security-patches\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n \n Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might\n allow remote attackers to cause a denial of service (daemon crash)\n via vectors related to failed DNS requests (CVE-2012-3517). \n \n The networkstatus_parse_vote_from_string function in routerparse.c\n in Tor before 0.2.2.38 does not properly handle an invalid flavor\n name, which allows remote attackers to cause a denial of service\n (out-of-bounds read and daemon crash) via a crafted (1) vote document\n or (2) consensus document (CVE-2012-3518). \n \n routerlist.c in Tor before 0.2.2.38 uses a different amount of time\n for relay-list iteration depending on which relay is chosen, which\n might allow remote attackers to obtain sensitive information about\n relay selection via a timing side-channel attack (CVE-2012-3519). \n \n The compare_tor_addr_to_addr_policy function in or/policies.c in\n Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.21-rc, allows remote\n attackers to cause a denial of service (assertion failure and daemon\n exit) via a zero-valued port field that is not properly handled during\n policy comparison (CVE-2012-4419). \n \n Tor before 0.2.2.39, when waiting for a client to renegotiate, allowed\n it to add bytes to the input buffer, allowing a crash to be caused\n remotely (tor-5934, tor-6007). \n \n Denial of Service vulnerability in Tor before 0.2.3.25, due to an\n error when handling SENDME cells and can be exploited to cause\n excessive consumption of memory resources within an entry node\n (SA51329, CVE-2012-5573). \n \n The version of Tor shipped in MBS1 did not have correctly formed\n systemd unit and thus failed to start. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2768\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2769\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3517\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3518\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3519\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4419\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5573\n https://wiki.mageia.org/en/Support/Advisories/MGAA-2012-0184\n https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0276\n https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0356\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 1/X86_64:\n 8cadc920e4452cd2a3551a3cb01d9fcf mbs1/x86_64/tor-0.2.2.39-1.mbs1.x86_64.rpm \n 7cbba7170bc4f9e6ee8409398437570c mbs1/SRPMS/tor-0.2.2.39-1.mbs1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- --------------------------------------------------------------------------\nDebian Security Advisory DSA-2331-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nOctober 28, 2011 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : tor\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE ID : CVE-2011-2768 CVE-2011-2769 \n\nIt has been discovered by \"frosty_un\" that a design flaw in Tor, an online\nprivacy tool, allows malicious relay servers to learn certain information\nthat they should not be able to learn. In combination with other attacks, this issue \ncan lead to deanonymizing the user. The Common Vulnerabilities and \nExposures project has assigned CVE-2011-2768 to this issue. \n\nIn addition to fixing the above mentioned issues, the updates to oldstable\nand stable fix a number of less critical issues (CVE-2011-2769). Please \nsee this posting from the Tor blog for more information:\nhttps://blog.torproject.org/blog/tor-02234-released-security-patches\n\nFor the oldstable distribution (lenny), this problem has been fixed in\nversion 0.2.1.31-1~lenny+1. Due to technical limitations in the Debian\narchive scripts, the update cannot be released synchronously with the\npackages for stable. It will be released shortly. \n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 0.2.1.31-1. \n\nFor the unstable and testing distributions, this problem has been fixed in\nversion 0.2.2.34-1. \n\nFor the experimental distribution, this problem have has fixed in version\n0.2.3.6-alpha-1. \n\nWe recommend that you upgrade your tor packages. \n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.11 (GNU/Linux)\n\niEYEARECAAYFAk6q1UIACgkQXm3vHE4uylrH1ACg6Y7x6by9MtC6d2whbYQvf0sV\nqdgAoM3IeWEe985DCPmvdBDHmEQBDzpk\n=HWr2\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201201-12\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Tor: Multiple vulnerabilities\n Date: January 23, 2012\n Bugs: #388769, #394969\n ID: 201201-12\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Tor, the most severe of\nwhich may allow a remote attacker to execute arbitrary code. \n* An error in or/buffers.c could result in a heap-based buffer overflow\n (CVE-2011-2778). \n\nImpact\n======\n\nA remote attacker could possibly execute arbitrary code or cause a\nDenial of Service. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Tor users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/tor-0.2.2.35\"\n\nReferences\n==========\n\n[ 1 ] CVE-2011-2768\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2768\n[ 2 ] CVE-2011-2769\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2769\n[ 3 ] CVE-2011-2778\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2778\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201201-12.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2012 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2011-2768" }, { "db": "JVNDB", "id": "JVNDB-2011-003512" }, { "db": "CNVD", "id": "CNVD-2011-5558" }, { "db": "BID", "id": "50414" }, { "db": "PACKETSTORM", "id": "106334" }, { "db": "PACKETSTORM", "id": "106460" }, { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "106343" }, { "db": "PACKETSTORM", "id": "108997" } ], "trust": 2.88 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-2768", "trust": 3.6 }, { "db": "BID", "id": "50414", "trust": 1.5 }, { "db": "JVNDB", "id": "JVNDB-2011-003512", "trust": 0.8 }, { "db": "SECUNIA", "id": "46634", "trust": 0.7 }, { "db": "SECUNIA", "id": "46640", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2011-5558", "trust": 0.6 }, { "db": "NSFOCUS", "id": "18089", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201110-700", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "106334", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "106460", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "121258", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "106343", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "108997", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-5558" }, { "db": "BID", "id": "50414" }, { "db": "JVNDB", "id": "JVNDB-2011-003512" }, { "db": "PACKETSTORM", "id": "106334" }, { "db": "PACKETSTORM", "id": "106460" }, { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "106343" }, { "db": "PACKETSTORM", "id": "108997" }, { "db": "CNNVD", "id": "CNNVD-201110-700" }, { "db": "NVD", "id": "CVE-2011-2768" } ] }, "id": "VAR-201112-0077", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2011-5558" } ], "trust": 1.0743589866666665 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-5558" } ] }, "last_update_date": "2024-11-23T21:46:10.220000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Tor 0.2.2.34 is released (security patches)", "trust": 0.8, "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "title": "Tor Directory Remote Information Disclosure Bridge Enumeration Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/35276" }, { "title": "Tor Fixes for permissions and access control issues vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172248" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-5558" }, { "db": "JVNDB", "id": "JVNDB-2011-003512" }, { "db": "CNNVD", "id": "CNNVD-201110-700" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003512" }, { "db": "NVD", "id": "CVE-2011-2768" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "trust": 1.1, "url": "http://www.debian.org/security/2011/dsa-2331" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2768" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-2768" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/50414/info" }, { "trust": 0.6, "url": "http://secunia.com/advisories/46634" }, { "trust": 0.6, "url": "http://secunia.com/advisories/46640" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/50414" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/18089" }, { "trust": 0.3, "url": "http://www.torproject.org/index.html.en" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2768" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2769" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/products/corporate/vim/ovum_2011_request/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/46634/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/46634/#comments" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46634" }, { "trust": 0.1, "url": "http://secunia.com/advisories/46640/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46640" }, { "trust": 0.1, "url": "http://secunia.com/advisories/46640/#comments" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2769" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3518" }, { "trust": 0.1, "url": "https://wiki.mageia.org/en/support/advisories/mgasa-2012-0276" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3519" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4419" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3517" }, { "trust": 0.1, "url": "https://wiki.mageia.org/en/support/advisories/mgaa-2012-0184" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/advisories/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3518" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5573" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3519" }, { "trust": 0.1, "url": "https://wiki.mageia.org/en/support/advisories/mgasa-2012-0356" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4419" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3517" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5573" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2778" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201201-12.xml" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2769" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2778" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2768" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-5558" }, { "db": "BID", "id": "50414" }, { "db": "JVNDB", "id": "JVNDB-2011-003512" }, { "db": "PACKETSTORM", "id": "106334" }, { "db": "PACKETSTORM", "id": "106460" }, { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "106343" }, { "db": "PACKETSTORM", "id": "108997" }, { "db": "CNNVD", "id": "CNNVD-201110-700" }, { "db": "NVD", "id": "CVE-2011-2768" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2011-5558" }, { "db": "BID", "id": "50414" }, { "db": "JVNDB", "id": "JVNDB-2011-003512" }, { "db": "PACKETSTORM", "id": "106334" }, { "db": "PACKETSTORM", "id": "106460" }, { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "106343" }, { "db": "PACKETSTORM", "id": "108997" }, { "db": "CNNVD", "id": "CNNVD-201110-700" }, { "db": "NVD", "id": "CVE-2011-2768" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2011-5558" }, { "date": "2011-10-28T00:00:00", "db": "BID", "id": "50414" }, { "date": "2011-12-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003512" }, { "date": "2011-10-28T12:05:57", "db": "PACKETSTORM", "id": "106334" }, { "date": "2011-11-01T07:54:34", "db": "PACKETSTORM", "id": "106460" }, { "date": "2013-04-11T02:39:54", "db": "PACKETSTORM", "id": "121258" }, { "date": "2011-10-28T21:21:09", "db": "PACKETSTORM", "id": "106343" }, { "date": "2012-01-24T04:16:55", "db": "PACKETSTORM", "id": "108997" }, { "date": "1900-01-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201110-700" }, { "date": "2011-12-23T03:59:21.957000", "db": "NVD", "id": "CVE-2011-2768" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2011-5558" }, { "date": "2015-05-07T17:17:00", "db": "BID", "id": "50414" }, { "date": "2011-12-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003512" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201110-700" }, { "date": "2024-11-21T01:28:56.107000", "db": "NVD", "id": "CVE-2011-2768" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "108997" }, { "db": "CNNVD", "id": "CNNVD-201110-700" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor Vulnerable to anonymization property disabled", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003512" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201110-700" } ], "trust": 0.6 } }
var-201001-0713
Vulnerability from variot
Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, when functioning as a bridge directory authority, allows remote attackers to obtain sensitive information about bridge identities and bridge descriptors via a dbg-stability.txt directory query. Tor (The Onion Router) is an implementation of the second generation of onion routing, through which users can communicate anonymously over the Internet. Tor is prone to a remote information-disclosure vulnerability. Exploits will allow attackers to obtain sensitive information that can help them launch further attacks. NOTE: Since certain Tor infrastructures were compromised, new version 3 identity keys have been issued. Versions prior to Tor 0.2.1.22 are vulnerable. ----------------------------------------------------------------------
Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/
TITLE: Tor Directory Authorities Directory Queries Information Disclosure
SECUNIA ADVISORY ID: SA38198
VERIFY ADVISORY: http://secunia.com/advisories/38198/
DESCRIPTION: A security issue has been reported in Tor, which can be exploited by malicious people to disclose potentially sensitive information.
SOLUTION: Update to version 0.2.1.22.
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: http://permalink.gmane.org/gmane.network.onion-routing.announce/30
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201001-0713", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.9" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.8" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.7" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.6" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.5" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.4" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.3" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.2" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.10" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.1" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.1_alpha-cvs" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5_alpha" }, { "model": "tor", "scope": "eq", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.7-alpha" }, { "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.x" }, { "model": "tor", "scope": "eq", "trust": 0.6, "vendor": "tor", "version": "0.2.x" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.35" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.34" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.33" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.32" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.31" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.214" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.123" }, { "model": ".5-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".4-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".3-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".2-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".1-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.118" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.1.21" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.1.20" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.2.15" }, { "model": "alpha-cvs", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.2.1" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.1.22" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-5331" }, { "db": "BID", "id": "37901" }, { "db": "JVNDB", "id": "JVNDB-2010-005252" }, { "db": "CNNVD", "id": "CNNVD-201001-255" }, { "db": "NVD", "id": "CVE-2010-0385" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:torproject:tor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-005252" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Roger Dingledine", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-255" } ], "trust": 0.6 }, "cve": "CVE-2010-0385", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2010-0385", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2010-5331", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2010-0385", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2010-0385", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2010-5331", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201001-255", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-5331" }, { "db": "JVNDB", "id": "JVNDB-2010-005252" }, { "db": "CNNVD", "id": "CNNVD-201001-255" }, { "db": "NVD", "id": "CVE-2010-0385" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, when functioning as a bridge directory authority, allows remote attackers to obtain sensitive information about bridge identities and bridge descriptors via a dbg-stability.txt directory query. Tor (The Onion Router) is an implementation of the second generation of onion routing, through which users can communicate anonymously over the Internet. Tor is prone to a remote information-disclosure vulnerability. \nExploits will allow attackers to obtain sensitive information that can help them launch further attacks. \nNOTE: Since certain Tor infrastructures were compromised, new version 3 identity keys have been issued. \nVersions prior to Tor 0.2.1.22 are vulnerable. ----------------------------------------------------------------------\n\n\n\nSecunia integrated with Microsoft WSUS \nhttp://secunia.com/blog/71/\n\n\n\n----------------------------------------------------------------------\n\nTITLE:\nTor Directory Authorities Directory Queries Information Disclosure\n\nSECUNIA ADVISORY ID:\nSA38198\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/38198/\n\nDESCRIPTION:\nA security issue has been reported in Tor, which can be exploited by\nmalicious people to disclose potentially sensitive information. \n\nSOLUTION:\nUpdate to version 0.2.1.22. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://permalink.gmane.org/gmane.network.onion-routing.announce/30\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2010-0385" }, { "db": "JVNDB", "id": "JVNDB-2010-005252" }, { "db": "CNVD", "id": "CNVD-2010-5331" }, { "db": "BID", "id": "37901" }, { "db": "PACKETSTORM", "id": "85478" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2010-0385", "trust": 3.3 }, { "db": "BID", "id": "37901", "trust": 2.5 }, { "db": "SECUNIA", "id": "38198", "trust": 1.7 }, { "db": "OSVDB", "id": "61865", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2010-005252", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2010-5331", "trust": 0.6 }, { "db": "MLIST", "id": "[OR-TALK] 20100120 TOR 0.2.2.7-ALPHA IS OUT", "trust": 0.6 }, { "db": "MLIST", "id": "[OR-ANNOUNCE] 20100121 TOR 0.2.1.22 IS RELEASED (SECURITY FIX)", "trust": 0.6 }, { "db": "NSFOCUS", "id": "14397", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201001-255", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "85478", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-5331" }, { "db": "BID", "id": "37901" }, { "db": "JVNDB", "id": "JVNDB-2010-005252" }, { "db": "PACKETSTORM", "id": "85478" }, { "db": "CNNVD", "id": "CNNVD-201001-255" }, { "db": "NVD", "id": "CVE-2010-0385" } ] }, "id": "VAR-201001-0713", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2010-5331" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-5331" } ] }, "last_update_date": "2024-11-23T22:09:13.614000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.torproject.org/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-005252" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-005252" }, { "db": "NVD", "id": "CVE-2010-0385" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "http://www.securityfocus.com/bid/37901" }, { "trust": 1.6, "url": "http://www.osvdb.org/61865" }, { "trust": 1.6, "url": "http://secunia.com/advisories/38198" }, { "trust": 1.6, "url": "http://archives.seul.org/or/talk/jan-2010/msg00162.html" }, { "trust": 1.6, "url": "http://archives.seul.org/or/announce/jan-2010/msg00000.html" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0385" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0385" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/14397" }, { "trust": 0.3, "url": "http://www.torproject.org/index.html.en" }, { "trust": 0.3, "url": "http://archives.seul.org/or/talk/jan-2010/msg00161.html" }, { "trust": 0.1, "url": "http://permalink.gmane.org/gmane.network.onion-routing.announce/30" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/blog/71/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/38198/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-5331" }, { "db": "BID", "id": "37901" }, { "db": "JVNDB", "id": "JVNDB-2010-005252" }, { "db": "PACKETSTORM", "id": "85478" }, { "db": "CNNVD", "id": "CNNVD-201001-255" }, { "db": "NVD", "id": "CVE-2010-0385" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2010-5331" }, { "db": "BID", "id": "37901" }, { "db": "JVNDB", "id": "JVNDB-2010-005252" }, { "db": "PACKETSTORM", "id": "85478" }, { "db": "CNNVD", "id": "CNNVD-201001-255" }, { "db": "NVD", "id": "CVE-2010-0385" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-01-25T00:00:00", "db": "CNVD", "id": "CNVD-2010-5331" }, { "date": "2010-01-21T00:00:00", "db": "BID", "id": "37901" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-005252" }, { "date": "2010-01-21T10:22:16", "db": "PACKETSTORM", "id": "85478" }, { "date": "2010-01-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201001-255" }, { "date": "2010-01-25T19:30:01.697000", "db": "NVD", "id": "CVE-2010-0385" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-01-25T00:00:00", "db": "CNVD", "id": "CNVD-2010-5331" }, { "date": "2015-04-13T21:03:00", "db": "BID", "id": "37901" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-005252" }, { "date": "2010-01-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201001-255" }, { "date": "2024-11-21T01:12:06.427000", "db": "NVD", "id": "CVE-2010-0385" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-255" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor official directory query request sensitive information disclosure vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2010-5331" }, { "db": "CNNVD", "id": "CNNVD-201001-255" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-255" } ], "trust": 0.6 } }
var-201101-0394
Vulnerability from variot
The tor_realloc function in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote attackers to cause a denial of service (daemon crash) via unspecified vectors, related to "underflow errors.". This vulnerability is related to a precision error.Service disruption by a third party ( Daemon crash ) There is a possibility of being put into a state. Tor is a second generation of onion routing implementation. To perform a denial of service (the daemon crashes). Tor is prone to multiple denial-of-service vulnerabilities. Attackers can exploit these issues to crash the affected computer, denying service to legitimate users. These issues affect versions prior to Tor 0.2.1.29, 0.2.2, and 0.2.2.21-alpha. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201110-13
http://security.gentoo.org/
Severity: High Title: Tor: Multiple vulnerabilities Date: October 18, 2011 Bugs: #351920, #359789 ID: 201110-13
Synopsis
Multiple vulnerabilities were found in Tor, the most severe of which may allow a remote attacker to execute arbitrary code.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/tor < 0.2.1.30 >= 0.2.1.30
Description
Multiple vulnerabilities have been discovered in Tor. Please review the CVE identifiers referenced below for details.
Impact
A remote unauthenticated attacker may be able to execute arbitrary code with the privileges of the Tor process or create a Denial of Service.
Workaround
There is no known workaround at this time.
Resolution
All Tor users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.1.30"
NOTE: This is a legacy GLSA. Updates for all affected architectures are available since April 2, 2011. It is likely that your system is already no longer affected by this issue.
References
[ 1 ] CVE-2011-0015 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0015 [ 2 ] CVE-2011-0016 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0016 [ 3 ] CVE-2011-0427 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0427 [ 4 ] CVE-2011-0490 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0490 [ 5 ] CVE-2011-0491 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0491 [ 6 ] CVE-2011-0492 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0492 [ 7 ] CVE-2011-0493 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0493 [ 8 ] CVE-2011-1924 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1924
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201110-13.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201101-0394", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.20" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.27" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.33" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.32" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.2" }, { "model": "tor", "scope": "lte", "trust": 1.0, "vendor": "tor", "version": "0.2.1.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.35" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.34" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.29" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.9" }, { "model": "tor", "scope": "eq", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.21-alpha" }, { "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.x" }, { "model": "tor", "scope": "lt", "trust": 0.6, "vendor": "tor", "version": "0.2.1.29" }, { "model": ".20-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".19-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".18-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".17-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".16-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".15-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".14-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.1.28" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": ".21-alpha", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.1.29" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0308" }, { "db": "BID", "id": "45953" }, { "db": "JVNDB", "id": "JVNDB-2011-004135" }, { "db": "CNNVD", "id": "CNNVD-201101-224" }, { "db": "NVD", "id": "CVE-2011-0491" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:torproject:tor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004135" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor", "sources": [ { "db": "BID", "id": "45953" } ], "trust": 0.3 }, "cve": "CVE-2011-0491", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2011-0491", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-0491", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-0491", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201101-224", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004135" }, { "db": "CNNVD", "id": "CNNVD-201101-224" }, { "db": "NVD", "id": "CVE-2011-0491" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The tor_realloc function in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote attackers to cause a denial of service (daemon crash) via unspecified vectors, related to \"underflow errors.\". This vulnerability is related to a precision error.Service disruption by a third party ( Daemon crash ) There is a possibility of being put into a state. Tor is a second generation of onion routing implementation. To perform a denial of service (the daemon crashes). Tor is prone to multiple denial-of-service vulnerabilities. \nAttackers can exploit these issues to crash the affected computer, denying service to legitimate users. \nThese issues affect versions prior to Tor 0.2.1.29, 0.2.2, and 0.2.2.21-alpha. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201110-13\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: Tor: Multiple vulnerabilities\n Date: October 18, 2011\n Bugs: #351920, #359789\n ID: 201110-13\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities were found in Tor, the most severe of which\nmay allow a remote attacker to execute arbitrary code. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/tor \u003c 0.2.1.30 \u003e= 0.2.1.30\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Tor. Please review the\nCVE identifiers referenced below for details. \n\nImpact\n======\n\nA remote unauthenticated attacker may be able to execute arbitrary code\nwith the privileges of the Tor process or create a Denial of Service. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Tor users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/tor-0.2.1.30\"\n\nNOTE: This is a legacy GLSA. Updates for all affected architectures are\navailable since April 2, 2011. It is likely that your system is already\nno longer affected by this issue. \n\nReferences\n==========\n\n[ 1 ] CVE-2011-0015\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0015\n[ 2 ] CVE-2011-0016\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0016\n[ 3 ] CVE-2011-0427\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0427\n[ 4 ] CVE-2011-0490\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0490\n[ 5 ] CVE-2011-0491\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0491\n[ 6 ] CVE-2011-0492\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0492\n[ 7 ] CVE-2011-0493\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0493\n[ 8 ] CVE-2011-1924\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1924\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201110-13.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2011 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n", "sources": [ { "db": "NVD", "id": "CVE-2011-0491" }, { "db": "JVNDB", "id": "JVNDB-2011-004135" }, { "db": "CNVD", "id": "CNVD-2011-0308" }, { "db": "BID", "id": "45953" }, { "db": "PACKETSTORM", "id": "105951" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-0491", "trust": 3.4 }, { "db": "BID", "id": "45953", "trust": 1.3 }, { "db": "JVNDB", "id": "JVNDB-2011-004135", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2011-0308", "trust": 0.6 }, { "db": "MLIST", "id": "[OR-ANNOUNCE] 20110117 TOR 0.2.1.29 IS RELEASED (SECURITY PATCHES)", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201101-224", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "105951", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0308" }, { "db": "BID", "id": "45953" }, { "db": "JVNDB", "id": "JVNDB-2011-004135" }, { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201101-224" }, { "db": "NVD", "id": "CVE-2011-0491" } ] }, "id": "VAR-201101-0394", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2011-0308" } ], "trust": 1.00865386 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0308" } ] }, "last_update_date": "2024-11-23T22:09:02.255000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "tor-02129-released-security-patches", "trust": 0.8, "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "title": "The Tor_realloc function provided by Tor does not have a patch for verifying vulnerabilities during memory allocation.", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/2711" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0308" }, { "db": "JVNDB", "id": "JVNDB-2011-004135" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004135" }, { "db": "NVD", "id": "CVE-2011-0491" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/changelog" }, { "trust": 1.9, "url": "https://trac.torproject.org/projects/tor/ticket/2324" }, { "trust": 1.9, "url": "http://archives.seul.org/or/announce/jan-2011/msg00000.html" }, { "trust": 1.9, "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64888" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/45953" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0491" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0491" }, { "trust": 0.3, "url": "https://trac.torproject.org/projects/tor/ticket/2326" }, { "trust": 0.3, "url": "https://trac.torproject.org/projects/tor/ticket/2352" }, { "trust": 0.3, "url": "https://trac.torproject.org/projects/tor/ticket/2190" }, { "trust": 0.3, "url": "http://www.torproject.org/index.html.en" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0016" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0493" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0493" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0016" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0490" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0015" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0490" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0491" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0492" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1924" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0015" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0491" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1924" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0492" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201110-13.xml" } ], "sources": [ { "db": "BID", "id": "45953" }, { "db": "JVNDB", "id": "JVNDB-2011-004135" }, { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201101-224" }, { "db": "NVD", "id": "CVE-2011-0491" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2011-0308" }, { "db": "BID", "id": "45953" }, { "db": "JVNDB", "id": "JVNDB-2011-004135" }, { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201101-224" }, { "db": "NVD", "id": "CVE-2011-0491" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-01-24T00:00:00", "db": "CNVD", "id": "CNVD-2011-0308" }, { "date": "2011-01-21T00:00:00", "db": "BID", "id": "45953" }, { "date": "2012-03-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-004135" }, { "date": "2011-10-18T19:42:05", "db": "PACKETSTORM", "id": "105951" }, { "date": "2011-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201101-224" }, { "date": "2011-01-19T12:00:20.047000", "db": "NVD", "id": "CVE-2011-0491" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-01-24T00:00:00", "db": "CNVD", "id": "CNVD-2011-0308" }, { "date": "2015-05-07T17:19:00", "db": "BID", "id": "45953" }, { "date": "2012-03-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-004135" }, { "date": "2011-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201101-224" }, { "date": "2024-11-21T01:24:07.613000", "db": "NVD", "id": "CVE-2011-0491" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201101-224" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor of tor_realloc Service disruption in functions (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004135" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201101-224" } ], "trust": 0.6 } }
var-201112-0161
Vulnerability from variot
Tor before 0.2.2.25-alpha, when configured as a relay without the Nickname configuration option, uses the local hostname as the Nickname value, which allows remote attackers to obtain potentially sensitive information by reading this value. Tor is prone to an information disclosure vulnerability. Successful exploits will allow attackers to obtain sensitive information to launch further attacks. Versions prior to Tor 0.2.2.25 are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201112-0161", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.7.1" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.6.1" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.6.2" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.7.2" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.9" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.8" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.7" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.6" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.5" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.4" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.3" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.2" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.10" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.1" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.29" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.28" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.27" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.33" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.32" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.7" }, { "model": "tor", "scope": "lte", "trust": 1.0, "vendor": "tor", "version": "0.2.2.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.35" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.34" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.29" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.4" }, { "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.25-alpha" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.224" }, { "model": ".21-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".20-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".19-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".18-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".17-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".16-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".15-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".14-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.35" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.34" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.33" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.32" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.31" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.214" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.123" }, { "model": ".5-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".4-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".3-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".2-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".1-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.118" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.1.30" }, { "model": "alpha-cvs", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.2.1" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.225" } ], "sources": [ { "db": "BID", "id": "51282" }, { "db": "JVNDB", "id": "JVNDB-2011-003518" }, { "db": "CNNVD", "id": "CNNVD-201112-433" }, { "db": "NVD", "id": "CVE-2011-4897" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:torproject:tor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003518" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "51282" } ], "trust": 0.3 }, "cve": "CVE-2011-4897", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2011-4897", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-4897", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-4897", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201112-433", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2011-4897", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2011-4897" }, { "db": "JVNDB", "id": "JVNDB-2011-003518" }, { "db": "CNNVD", "id": "CNNVD-201112-433" }, { "db": "NVD", "id": "CVE-2011-4897" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor before 0.2.2.25-alpha, when configured as a relay without the Nickname configuration option, uses the local hostname as the Nickname value, which allows remote attackers to obtain potentially sensitive information by reading this value. Tor is prone to an information disclosure vulnerability. \nSuccessful exploits will allow attackers to obtain sensitive information to launch further attacks. \nVersions prior to Tor 0.2.2.25 are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2011-4897" }, { "db": "JVNDB", "id": "JVNDB-2011-003518" }, { "db": "BID", "id": "51282" }, { "db": "VULMON", "id": "CVE-2011-4897" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-4897", "trust": 2.8 }, { "db": "JVNDB", "id": "JVNDB-2011-003518", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201112-433", "trust": 0.6 }, { "db": "BID", "id": "51282", "trust": 0.4 }, { "db": "VULMON", "id": "CVE-2011-4897", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2011-4897" }, { "db": "BID", "id": "51282" }, { "db": "JVNDB", "id": "JVNDB-2011-003518" }, { "db": "CNNVD", "id": "CNNVD-201112-433" }, { "db": "NVD", "id": "CVE-2011-4897" } ] }, "id": "VAR-201112-0161", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4086538599999999 }, "last_update_date": "2024-11-23T22:27:38.558000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Tor 0.2.2.25-alpha is out", "trust": 0.8, "url": "https://blog.torproject.org/blog/tor-02225-alpha-out" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003518" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003518" }, { "db": "NVD", "id": "CVE-2011-4897" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://blog.torproject.org/blog/tor-02225-alpha-out" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4897" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4897" }, { "trust": 0.3, "url": "http://www.torproject.org/index.html.en" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/200.html" }, { "trust": 0.1, "url": "https://www.securityfocus.com/bid/51282" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2011-4897" }, { "db": "BID", "id": "51282" }, { "db": "JVNDB", "id": "JVNDB-2011-003518" }, { "db": "CNNVD", "id": "CNNVD-201112-433" }, { "db": "NVD", "id": "CVE-2011-4897" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2011-4897" }, { "db": "BID", "id": "51282" }, { "db": "JVNDB", "id": "JVNDB-2011-003518" }, { "db": "CNNVD", "id": "CNNVD-201112-433" }, { "db": "NVD", "id": "CVE-2011-4897" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-12-23T00:00:00", "db": "VULMON", "id": "CVE-2011-4897" }, { "date": "2011-05-02T00:00:00", "db": "BID", "id": "51282" }, { "date": "2011-12-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003518" }, { "date": "2011-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201112-433" }, { "date": "2011-12-23T03:59:22.177000", "db": "NVD", "id": "CVE-2011-4897" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-12-30T00:00:00", "db": "VULMON", "id": "CVE-2011-4897" }, { "date": "2011-05-02T00:00:00", "db": "BID", "id": "51282" }, { "date": "2011-12-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003518" }, { "date": "2011-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201112-433" }, { "date": "2024-11-21T01:33:15.500000", "db": "NVD", "id": "CVE-2011-4897" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201112-433" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor Vulnerability in which important information is obtained", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003518" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201112-433" } ], "trust": 0.6 } }
var-201112-0164
Vulnerability from variot
Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building. Tor is prone to a bridge enumeration weakness. Successful exploits will allow attackers to obtain sensitive information to launch further attacks. Versions prior to Tor 0.2.2.34 are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201112-0164", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.7.1" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.6.1" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.6.2" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.7.2" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.9" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.8" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.7" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.6" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.5" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.4" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.3" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.2" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.10" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.1" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.33" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.32" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.35" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.34" }, { "model": "tor", "scope": "lte", "trust": 1.0, "vendor": "tor", "version": "0.2.2.33" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.29" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.32" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.29" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.29" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.4" }, { "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.34" }, { "model": ".21-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".20-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".19-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".18-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".17-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".16-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".15-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".14-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.35" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.34" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.33" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.32" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.31" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.214" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.123" }, { "model": ".5-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".4-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".3-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".2-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".1-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.118" }, { "model": "alpha-cvs", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.2.1" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.2.34" } ], "sources": [ { "db": "BID", "id": "51279" }, { "db": "JVNDB", "id": "JVNDB-2011-003516" }, { "db": "CNNVD", "id": "CNNVD-201112-431" }, { "db": "NVD", "id": "CVE-2011-4895" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:torproject:tor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003516" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "51279" } ], "trust": 0.3 }, "cve": "CVE-2011-4895", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2011-4895", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-4895", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-4895", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201112-431", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003516" }, { "db": "CNNVD", "id": "CNNVD-201112-431" }, { "db": "NVD", "id": "CVE-2011-4895" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building. Tor is prone to a bridge enumeration weakness. \nSuccessful exploits will allow attackers to obtain sensitive information to launch further attacks. \nVersions prior to Tor 0.2.2.34 are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2011-4895" }, { "db": "JVNDB", "id": "JVNDB-2011-003516" }, { "db": "BID", "id": "51279" } ], "trust": 1.89 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-4895", "trust": 2.7 }, { "db": "JVNDB", "id": "JVNDB-2011-003516", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201112-431", "trust": 0.6 }, { "db": "BID", "id": "51279", "trust": 0.3 } ], "sources": [ { "db": "BID", "id": "51279" }, { "db": "JVNDB", "id": "JVNDB-2011-003516" }, { "db": "CNNVD", "id": "CNNVD-201112-431" }, { "db": "NVD", "id": "CVE-2011-4895" } ] }, "id": "VAR-201112-0164", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4086538599999999 }, "last_update_date": "2024-11-23T22:08:53.637000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Tor 0.2.2.34 is released (security patches)", "trust": 0.8, "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003516" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003516" }, { "db": "NVD", "id": "CVE-2011-4895" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4895" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4895" }, { "trust": 0.3, "url": "http://www.torproject.org/index.html.en" } ], "sources": [ { "db": "BID", "id": "51279" }, { "db": "JVNDB", "id": "JVNDB-2011-003516" }, { "db": "CNNVD", "id": "CNNVD-201112-431" }, { "db": "NVD", "id": "CVE-2011-4895" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "51279" }, { "db": "JVNDB", "id": "JVNDB-2011-003516" }, { "db": "CNNVD", "id": "CNNVD-201112-431" }, { "db": "NVD", "id": "CVE-2011-4895" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-10-27T00:00:00", "db": "BID", "id": "51279" }, { "date": "2011-12-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003516" }, { "date": "2011-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201112-431" }, { "date": "2011-12-23T03:59:22.097000", "db": "NVD", "id": "CVE-2011-4895" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-10-27T00:00:00", "db": "BID", "id": "51279" }, { "date": "2011-12-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003516" }, { "date": "2011-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201112-431" }, { "date": "2024-11-21T01:33:15.193000", "db": "NVD", "id": "CVE-2011-4895" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201112-431" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor Enumerated bridge vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003516" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201112-431" } ], "trust": 0.6 } }
var-201112-0312
Vulnerability from variot
Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values. Tor (The Onion Router) is an implementation of the second generation of onion routing, which allows users to communicate anonymously over the Internet. Tor has security holes in its implementation that can be exploited by malicious users to disclose sensitive information. This vulnerability is caused by the client reusing a TLS certificate on some connections. Simulate a user's detection of multiple protection relays by using a user certificate identification key to determine the connection status of the user. Tor is prone to a remote information-disclosure vulnerability and a bridge enumeration weakness. Exploits will allow attackers to obtain sensitive information that can help them launch further attacks. Versions prior to Tor 0.2.2.34 are vulnerable. ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach? Fast vulnerability intelligence, threat handling, and setup in one tool.
Read the new report on the Secunia VIM: http://secunia.com/products/corporate/vim/ovum_2011_request/
TITLE: Tor TLS Certificate Reuse User De-Anonymisation Security Issue
SECUNIA ADVISORY ID: SA46634
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46634/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46634
RELEASE DATE: 2011-10-28
DISCUSS ADVISORY: http://secunia.com/advisories/46634/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/46634/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46634
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A security issue has been reported in Tor, which can be exploited by malicious people to disclose potentially sensitive information. This can be exploited to e.g. fingerprint and de-anonymise a user by e.g.
Note: Additionally, enhancement have been made to protect against bridge enumeration attacks.
SOLUTION: Update to version 0.2.2.34.
PROVIDED AND/OR DISCOVERED BY: The vendor credits frosty_un.
ORIGINAL ADVISORY: https://blog.torproject.org/blog/tor-02234-released-security-patches
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
.
Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests (CVE-2012-3517).
The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted (1) vote document or (2) consensus document (CVE-2012-3518).
routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack (CVE-2012-3519).
The compare_tor_addr_to_addr_policy function in or/policies.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.21-rc, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a zero-valued port field that is not properly handled during policy comparison (CVE-2012-4419).
Tor before 0.2.2.39, when waiting for a client to renegotiate, allowed it to add bytes to the input buffer, allowing a crash to be caused remotely (tor-5934, tor-6007).
Denial of Service vulnerability in Tor before 0.2.3.25, due to an error when handling SENDME cells and can be exploited to cause excessive consumption of memory resources within an entry node (SA51329, CVE-2012-5573).
The version of Tor shipped in MBS1 did not have correctly formed systemd unit and thus failed to start.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2768 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2769 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3517 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3518 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3519 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4419 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5573 https://wiki.mageia.org/en/Support/Advisories/MGAA-2012-0184 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0276 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0356
Updated Packages:
Mandriva Business Server 1/X86_64: 8cadc920e4452cd2a3551a3cb01d9fcf mbs1/x86_64/tor-0.2.2.39-1.mbs1.x86_64.rpm 7cbba7170bc4f9e6ee8409398437570c mbs1/SRPMS/tor-0.2.2.39-1.mbs1.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-2331-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff October 28, 2011 http://www.debian.org/security/faq
Package : tor Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2011-2768 CVE-2011-2769
It has been discovered by "frosty_un" that a design flaw in Tor, an online privacy tool, allows malicious relay servers to learn certain information that they should not be able to learn. In combination with other attacks, this issue can lead to deanonymizing the user. The Common Vulnerabilities and Exposures project has assigned CVE-2011-2768 to this issue.
In addition to fixing the above mentioned issues, the updates to oldstable and stable fix a number of less critical issues (CVE-2011-2769). Please see this posting from the Tor blog for more information: https://blog.torproject.org/blog/tor-02234-released-security-patches
For the oldstable distribution (lenny), this problem has been fixed in version 0.2.1.31-1~lenny+1. Due to technical limitations in the Debian archive scripts, the update cannot be released synchronously with the packages for stable. It will be released shortly.
For the stable distribution (squeeze), this problem has been fixed in version 0.2.1.31-1.
For the unstable and testing distributions, this problem has been fixed in version 0.2.2.34-1.
For the experimental distribution, this problem have has fixed in version 0.2.3.6-alpha-1.
We recommend that you upgrade your tor packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)
iEYEARECAAYFAk6q1UIACgkQXm3vHE4uylrH1ACg6Y7x6by9MtC6d2whbYQvf0sV qdgAoM3IeWEe985DCPmvdBDHmEQBDzpk =HWr2 -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201201-12
http://security.gentoo.org/
Severity: Normal Title: Tor: Multiple vulnerabilities Date: January 23, 2012 Bugs: #388769, #394969 ID: 201201-12
Synopsis
Multiple vulnerabilities have been found in Tor, the most severe of which may allow a remote attacker to execute arbitrary code. * When configured as a bridge, Tor relays can distinguish incoming bridge connections from client connections (CVE-2011-2769). * An error in or/buffers.c could result in a heap-based buffer overflow (CVE-2011-2778).
Impact
A remote attacker could possibly execute arbitrary code or cause a Denial of Service.
Workaround
There is no known workaround at this time.
Resolution
All Tor users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.2.35"
References
[ 1 ] CVE-2011-2768 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2768 [ 2 ] CVE-2011-2769 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2769 [ 3 ] CVE-2011-2778 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2778
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201201-12.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201112-0312", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.9" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.8" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.7" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.6" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.5" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.4" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.3" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.2" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.10" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9.1" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.1.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.33" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.32" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.35" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.34" }, { "model": "tor", "scope": "lte", "trust": 1.0, "vendor": "tor", "version": "0.2.2.33" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.29" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.32" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.29" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.29" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.4" }, { "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.34" }, { "model": "\u003c0.2.2.20-alpha", "scope": null, "trust": 0.6, "vendor": "tor", "version": null }, { "model": ".21-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".20-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".19-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".18-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".17-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".16-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".15-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".14-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.35" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.34" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.33" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.32" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.31" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.214" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.123" }, { "model": ".5-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".4-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".3-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".2-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".1-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.118" }, { "model": "alpha-cvs", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.2.1" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1x8664" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.2.34" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-5558" }, { "db": "BID", "id": "50414" }, { "db": "JVNDB", "id": "JVNDB-2011-003513" }, { "db": "NVD", "id": "CVE-2011-2769" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:torproject:tor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003513" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "frosty_un", "sources": [ { "db": "BID", "id": "50414" }, { "db": "CNNVD", "id": "CNNVD-201110-701" } ], "trust": 0.9 }, "cve": "CVE-2011-2769", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2011-2769", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2011-5558", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-2769", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-2769", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2011-5558", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201110-701", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-5558" }, { "db": "JVNDB", "id": "JVNDB-2011-003513" }, { "db": "CNNVD", "id": "CNNVD-201110-701" }, { "db": "NVD", "id": "CVE-2011-2769" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values. Tor (The Onion Router) is an implementation of the second generation of onion routing, which allows users to communicate anonymously over the Internet. Tor has security holes in its implementation that can be exploited by malicious users to disclose sensitive information. This vulnerability is caused by the client reusing a TLS certificate on some connections. Simulate a user\u0027s detection of multiple protection relays by using a user certificate identification key to determine the connection status of the user. Tor is prone to a remote information-disclosure vulnerability and a bridge enumeration weakness. \nExploits will allow attackers to obtain sensitive information that can help them launch further attacks. \nVersions prior to Tor 0.2.2.34 are vulnerable. ----------------------------------------------------------------------\n\nOvum says ad hoc tools are out-dated. The best practice approach?\nFast vulnerability intelligence, threat handling, and setup in one tool. \n\nRead the new report on the Secunia VIM:\nhttp://secunia.com/products/corporate/vim/ovum_2011_request/ \n\n----------------------------------------------------------------------\n\nTITLE:\nTor TLS Certificate Reuse User De-Anonymisation Security Issue\n\nSECUNIA ADVISORY ID:\nSA46634\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/46634/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46634\n\nRELEASE DATE:\n2011-10-28\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/46634/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/46634/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46634\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA security issue has been reported in Tor, which can be exploited by\nmalicious people to disclose potentially sensitive information. This can be exploited to e.g. \nfingerprint and de-anonymise a user by e.g. \n\nNote: Additionally, enhancement have been made to protect against\nbridge enumeration attacks. \n\nSOLUTION:\nUpdate to version 0.2.2.34. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits frosty_un. \n\nORIGINAL ADVISORY:\nhttps://blog.torproject.org/blog/tor-02234-released-security-patches\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n \n Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might\n allow remote attackers to cause a denial of service (daemon crash)\n via vectors related to failed DNS requests (CVE-2012-3517). \n \n The networkstatus_parse_vote_from_string function in routerparse.c\n in Tor before 0.2.2.38 does not properly handle an invalid flavor\n name, which allows remote attackers to cause a denial of service\n (out-of-bounds read and daemon crash) via a crafted (1) vote document\n or (2) consensus document (CVE-2012-3518). \n \n routerlist.c in Tor before 0.2.2.38 uses a different amount of time\n for relay-list iteration depending on which relay is chosen, which\n might allow remote attackers to obtain sensitive information about\n relay selection via a timing side-channel attack (CVE-2012-3519). \n \n The compare_tor_addr_to_addr_policy function in or/policies.c in\n Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.21-rc, allows remote\n attackers to cause a denial of service (assertion failure and daemon\n exit) via a zero-valued port field that is not properly handled during\n policy comparison (CVE-2012-4419). \n \n Tor before 0.2.2.39, when waiting for a client to renegotiate, allowed\n it to add bytes to the input buffer, allowing a crash to be caused\n remotely (tor-5934, tor-6007). \n \n Denial of Service vulnerability in Tor before 0.2.3.25, due to an\n error when handling SENDME cells and can be exploited to cause\n excessive consumption of memory resources within an entry node\n (SA51329, CVE-2012-5573). \n \n The version of Tor shipped in MBS1 did not have correctly formed\n systemd unit and thus failed to start. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2768\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2769\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3517\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3518\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3519\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4419\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5573\n https://wiki.mageia.org/en/Support/Advisories/MGAA-2012-0184\n https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0276\n https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0356\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 1/X86_64:\n 8cadc920e4452cd2a3551a3cb01d9fcf mbs1/x86_64/tor-0.2.2.39-1.mbs1.x86_64.rpm \n 7cbba7170bc4f9e6ee8409398437570c mbs1/SRPMS/tor-0.2.2.39-1.mbs1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- --------------------------------------------------------------------------\nDebian Security Advisory DSA-2331-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nOctober 28, 2011 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : tor\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE ID : CVE-2011-2768 CVE-2011-2769 \n\nIt has been discovered by \"frosty_un\" that a design flaw in Tor, an online\nprivacy tool, allows malicious relay servers to learn certain information\nthat they should not be able to learn. In combination with other attacks, this issue \ncan lead to deanonymizing the user. The Common Vulnerabilities and \nExposures project has assigned CVE-2011-2768 to this issue. \n\nIn addition to fixing the above mentioned issues, the updates to oldstable\nand stable fix a number of less critical issues (CVE-2011-2769). Please \nsee this posting from the Tor blog for more information:\nhttps://blog.torproject.org/blog/tor-02234-released-security-patches\n\nFor the oldstable distribution (lenny), this problem has been fixed in\nversion 0.2.1.31-1~lenny+1. Due to technical limitations in the Debian\narchive scripts, the update cannot be released synchronously with the\npackages for stable. It will be released shortly. \n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 0.2.1.31-1. \n\nFor the unstable and testing distributions, this problem has been fixed in\nversion 0.2.2.34-1. \n\nFor the experimental distribution, this problem have has fixed in version\n0.2.3.6-alpha-1. \n\nWe recommend that you upgrade your tor packages. \n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.11 (GNU/Linux)\n\niEYEARECAAYFAk6q1UIACgkQXm3vHE4uylrH1ACg6Y7x6by9MtC6d2whbYQvf0sV\nqdgAoM3IeWEe985DCPmvdBDHmEQBDzpk\n=HWr2\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201201-12\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Tor: Multiple vulnerabilities\n Date: January 23, 2012\n Bugs: #388769, #394969\n ID: 201201-12\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Tor, the most severe of\nwhich may allow a remote attacker to execute arbitrary code. \n* When configured as a bridge, Tor relays can distinguish incoming\n bridge connections from client connections (CVE-2011-2769). \n* An error in or/buffers.c could result in a heap-based buffer overflow\n (CVE-2011-2778). \n\nImpact\n======\n\nA remote attacker could possibly execute arbitrary code or cause a\nDenial of Service. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Tor users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/tor-0.2.2.35\"\n\nReferences\n==========\n\n[ 1 ] CVE-2011-2768\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2768\n[ 2 ] CVE-2011-2769\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2769\n[ 3 ] CVE-2011-2778\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2778\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201201-12.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2012 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2011-2769" }, { "db": "JVNDB", "id": "JVNDB-2011-003513" }, { "db": "CNVD", "id": "CNVD-2011-5558" }, { "db": "BID", "id": "50414" }, { "db": "PACKETSTORM", "id": "106334" }, { "db": "PACKETSTORM", "id": "106460" }, { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "106343" }, { "db": "PACKETSTORM", "id": "108997" } ], "trust": 2.88 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-2769", "trust": 3.6 }, { "db": "BID", "id": "50414", "trust": 1.5 }, { "db": "JVNDB", "id": "JVNDB-2011-003513", "trust": 0.8 }, { "db": "SECUNIA", "id": "46634", "trust": 0.7 }, { "db": "SECUNIA", "id": "46640", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2011-5558", "trust": 0.6 }, { "db": "NSFOCUS", "id": "18089", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201110-701", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "106334", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "106460", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "121258", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "106343", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "108997", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-5558" }, { "db": "BID", "id": "50414" }, { "db": "JVNDB", "id": "JVNDB-2011-003513" }, { "db": "PACKETSTORM", "id": "106334" }, { "db": "PACKETSTORM", "id": "106460" }, { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "106343" }, { "db": "PACKETSTORM", "id": "108997" }, { "db": "CNNVD", "id": "CNNVD-201110-701" }, { "db": "NVD", "id": "CVE-2011-2769" } ] }, "id": "VAR-201112-0312", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2011-5558" } ], "trust": 1.0743589866666665 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-5558" } ] }, "last_update_date": "2024-11-23T21:46:09.909000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Tor 0.2.2.34 is released (security patches)", "trust": 0.8, "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "title": "Tor Directory Remote Information Disclosure Bridge Enumeration Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/35276" }, { "title": "Tor Repair measures for information disclosure vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172249" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-5558" }, { "db": "JVNDB", "id": "JVNDB-2011-003513" }, { "db": "CNNVD", "id": "CNNVD-201110-701" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003513" }, { "db": "NVD", "id": "CVE-2011-2769" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "trust": 1.1, "url": "http://www.debian.org/security/2011/dsa-2331" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2769" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-2769" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/50414/info" }, { "trust": 0.6, "url": "http://secunia.com/advisories/46634" }, { "trust": 0.6, "url": "http://secunia.com/advisories/46640" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/50414" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/18089" }, { "trust": 0.3, "url": "http://www.torproject.org/index.html.en" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2768" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2769" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/products/corporate/vim/ovum_2011_request/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/46634/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/46634/#comments" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46634" }, { "trust": 0.1, "url": "http://secunia.com/advisories/46640/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46640" }, { "trust": 0.1, "url": "http://secunia.com/advisories/46640/#comments" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3518" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2768" }, { "trust": 0.1, "url": "https://wiki.mageia.org/en/support/advisories/mgasa-2012-0276" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3519" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4419" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3517" }, { "trust": 0.1, "url": "https://wiki.mageia.org/en/support/advisories/mgaa-2012-0184" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/advisories/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3518" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5573" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3519" }, { "trust": 0.1, "url": "https://wiki.mageia.org/en/support/advisories/mgasa-2012-0356" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4419" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3517" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5573" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2778" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201201-12.xml" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2769" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2778" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2768" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-5558" }, { "db": "BID", "id": "50414" }, { "db": "JVNDB", "id": "JVNDB-2011-003513" }, { "db": "PACKETSTORM", "id": "106334" }, { "db": "PACKETSTORM", "id": "106460" }, { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "106343" }, { "db": "PACKETSTORM", "id": "108997" }, { "db": "CNNVD", "id": "CNNVD-201110-701" }, { "db": "NVD", "id": "CVE-2011-2769" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2011-5558" }, { "db": "BID", "id": "50414" }, { "db": "JVNDB", "id": "JVNDB-2011-003513" }, { "db": "PACKETSTORM", "id": "106334" }, { "db": "PACKETSTORM", "id": "106460" }, { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "106343" }, { "db": "PACKETSTORM", "id": "108997" }, { "db": "CNNVD", "id": "CNNVD-201110-701" }, { "db": "NVD", "id": "CVE-2011-2769" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2011-5558" }, { "date": "2011-10-28T00:00:00", "db": "BID", "id": "50414" }, { "date": "2011-12-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003513" }, { "date": "2011-10-28T12:05:57", "db": "PACKETSTORM", "id": "106334" }, { "date": "2011-11-01T07:54:34", "db": "PACKETSTORM", "id": "106460" }, { "date": "2013-04-11T02:39:54", "db": "PACKETSTORM", "id": "121258" }, { "date": "2011-10-28T21:21:09", "db": "PACKETSTORM", "id": "106343" }, { "date": "2012-01-24T04:16:55", "db": "PACKETSTORM", "id": "108997" }, { "date": "1900-01-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201110-701" }, { "date": "2011-12-23T03:59:21.990000", "db": "NVD", "id": "CVE-2011-2769" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2011-5558" }, { "date": "2015-05-07T17:17:00", "db": "BID", "id": "50414" }, { "date": "2011-12-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003513" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201110-701" }, { "date": "2024-11-21T01:28:56.277000", "db": "NVD", "id": "CVE-2011-2769" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "108997" }, { "db": "CNNVD", "id": "CNNVD-201110-701" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor Enumerated bridge vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003513" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201110-701" } ], "trust": 0.6 } }
var-201208-0158
Vulnerability from variot
The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted (1) vote document or (2) consensus document. Tor is a second generation of onion routing implementation. Allows an attacker to exploit a vulnerability to crash an application. Tor is prone to multiple remote vulnerabilities, including: 1. Multiple denial-of-service vulnerabilities. 2. An information-disclosure vulnerability. 3. An out-of-bounds memory-access vulnerability. Attackers can exploit theses issues to crash the affected application, cause denial-of service conditions, or retrieve potentially sensitive information. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Mandriva Linux Security Advisory MDVSA-2013:132 http://www.mandriva.com/en/support/security/
Package : tor Date : April 10, 2013 Affected: Business Server 1.0
Problem Description:
Updated tor package fixes security vulnerabilities:
Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected (CVE-2011-2768).
Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values (CVE-2011-2769).
routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack (CVE-2012-3519).
Tor before 0.2.2.39, when waiting for a client to renegotiate, allowed it to add bytes to the input buffer, allowing a crash to be caused remotely (tor-5934, tor-6007).
Denial of Service vulnerability in Tor before 0.2.3.25, due to an error when handling SENDME cells and can be exploited to cause excessive consumption of memory resources within an entry node (SA51329, CVE-2012-5573).
The version of Tor shipped in MBS1 did not have correctly formed systemd unit and thus failed to start.
This updated version corrects this problem and restores working behaviour.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2768 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2769 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3517 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3518 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3519 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4419 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5573 https://wiki.mageia.org/en/Support/Advisories/MGAA-2012-0184 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0276 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0356
Updated Packages:
Mandriva Business Server 1/X86_64: 8cadc920e4452cd2a3551a3cb01d9fcf mbs1/x86_64/tor-0.2.2.39-1.mbs1.x86_64.rpm 7cbba7170bc4f9e6ee8409398437570c mbs1/SRPMS/tor-0.2.2.39-1.mbs1.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFRZVsDmqjQ0CJFipgRAm9IAJ9tYUVrI7u2V+7yJGNLn2OVMdOzcACgyrhf PUIroe88x4NDpj7AUyd2YP8= =x4YG -----END PGP SIGNATURE-----
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201301-03
http://security.gentoo.org/
Severity: Normal Title: Tor: Multiple vulnerabilities Date: January 08, 2013 Bugs: #432188, #434882, #444804 ID: 201301-03
Synopsis
Multiple vulnerabilities have been found in Tor, allowing attackers to cause Denial of Service or obtain sensitive information. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All Tor users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.3.25"
References
[ 1 ] CVE-2012-3517 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3517 [ 2 ] CVE-2012-3518 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3518 [ 3 ] CVE-2012-3519 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3519 [ 4 ] CVE-2012-4419 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4419 [ 5 ] CVE-2012-4922 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4922 [ 6 ] CVE-2012-5573 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5573
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201301-03.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 .
CVE-2012-3519
Try to leak less information about what relays a client is choosing to a side-channel attacker. This fixes a potential DoS issue [tor-5934, tor-6007].
For the stable distribution (squeeze), these problems have been fixed in version 0.2.2.39-1.
For the unstable distribution, these problems have been fixed in version 0.2.3.22-rc-1.
We recommend that you upgrade your tor packages. ----------------------------------------------------------------------
The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/
TITLE: Debian update for tor
SECUNIA ADVISORY ID: SA50583
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/50583/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=50583
RELEASE DATE: 2012-09-14
DISCUSS ADVISORY: http://secunia.com/advisories/50583/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/50583/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=50583
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Debian has issued an update for tor.
ORIGINAL ADVISORY: DSA-2548-1: http://www.debian.org/security/2012/dsa-2548
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201208-0158", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "lte", "trust": 1.0, "vendor": "tor", "version": "0.2.2.37" }, { "model": "tor", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.2.34" }, { "model": ".14-alpha", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.2" }, { "model": ".15-alpha", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.2" }, { "model": ".16-alpha", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.2" }, { "model": ".17-alpha", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.2" }, { "model": ".18-alpha", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.2" }, { "model": ".19-alpha", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.2" }, { "model": ".20-alpha", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.2" }, { "model": ".21-alpha", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.224" }, { "model": "tor", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.225" }, { "model": "tor", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.2.37" }, { "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.38" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1x8664" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.2.38" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-4391" }, { "db": "BID", "id": "55128" }, { "db": "JVNDB", "id": "JVNDB-2012-003894" }, { "db": "CNNVD", "id": "CNNVD-201208-381" }, { "db": "NVD", "id": "CVE-2012-3518" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:torproject:tor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003894" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Arma, Asn, and Nickm", "sources": [ { "db": "BID", "id": "55128" }, { "db": "CNNVD", "id": "CNNVD-201208-381" } ], "trust": 0.9 }, "cve": "CVE-2012-3518", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2012-3518", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-3518", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-3518", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201208-381", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003894" }, { "db": "CNNVD", "id": "CNNVD-201208-381" }, { "db": "NVD", "id": "CVE-2012-3518" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted (1) vote document or (2) consensus document. Tor is a second generation of onion routing implementation. Allows an attacker to exploit a vulnerability to crash an application. Tor is prone to multiple remote vulnerabilities, including:\n1. Multiple denial-of-service vulnerabilities. \n2. An information-disclosure vulnerability. \n3. An out-of-bounds memory-access vulnerability. \nAttackers can exploit theses issues to crash the affected application, cause denial-of service conditions, or retrieve potentially sensitive information. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n _______________________________________________________________________\n\n Mandriva Linux Security Advisory MDVSA-2013:132\n http://www.mandriva.com/en/support/security/\n _______________________________________________________________________\n\n Package : tor\n Date : April 10, 2013\n Affected: Business Server 1.0\n _______________________________________________________________________\n\n Problem Description:\n\n Updated tor package fixes security vulnerabilities:\n \n Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS\n certificate chain as part of an outgoing OR connection, which allows\n remote relays to bypass intended anonymity properties by reading this\n chain and then determining the set of entry guards that the client\n or bridge had selected (CVE-2011-2768). \n \n Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE\n and CREATE_FAST values in the Command field of a cell within an OR\n connection that it initiated, which allows remote relays to enumerate\n bridges by using these values (CVE-2011-2769). \n \n routerlist.c in Tor before 0.2.2.38 uses a different amount of time\n for relay-list iteration depending on which relay is chosen, which\n might allow remote attackers to obtain sensitive information about\n relay selection via a timing side-channel attack (CVE-2012-3519). \n \n Tor before 0.2.2.39, when waiting for a client to renegotiate, allowed\n it to add bytes to the input buffer, allowing a crash to be caused\n remotely (tor-5934, tor-6007). \n \n Denial of Service vulnerability in Tor before 0.2.3.25, due to an\n error when handling SENDME cells and can be exploited to cause\n excessive consumption of memory resources within an entry node\n (SA51329, CVE-2012-5573). \n \n The version of Tor shipped in MBS1 did not have correctly formed\n systemd unit and thus failed to start. \n \n This updated version corrects this problem and restores working\n behaviour. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2768\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2769\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3517\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3518\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3519\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4419\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5573\n https://wiki.mageia.org/en/Support/Advisories/MGAA-2012-0184\n https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0276\n https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0356\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 1/X86_64:\n 8cadc920e4452cd2a3551a3cb01d9fcf mbs1/x86_64/tor-0.2.2.39-1.mbs1.x86_64.rpm \n 7cbba7170bc4f9e6ee8409398437570c mbs1/SRPMS/tor-0.2.2.39-1.mbs1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/en/support/security/advisories/\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niD8DBQFRZVsDmqjQ0CJFipgRAm9IAJ9tYUVrI7u2V+7yJGNLn2OVMdOzcACgyrhf\nPUIroe88x4NDpj7AUyd2YP8=\n=x4YG\n-----END PGP SIGNATURE-----\n\n\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201301-03\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Tor: Multiple vulnerabilities\n Date: January 08, 2013\n Bugs: #432188, #434882, #444804\n ID: 201301-03\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Tor, allowing attackers to\ncause Denial of Service or obtain sensitive information. Please review the\nCVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Tor users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/tor-0.2.3.25\"\n\nReferences\n==========\n\n[ 1 ] CVE-2012-3517\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3517\n[ 2 ] CVE-2012-3518\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3518\n[ 3 ] CVE-2012-3519\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3519\n[ 4 ] CVE-2012-4419\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4419\n[ 5 ] CVE-2012-4922\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4922\n[ 6 ] CVE-2012-5573\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5573\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201301-03.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2013 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. \n\nCVE-2012-3519\n\n Try to leak less information about what relays a client is choosing to\n a side-channel attacker. This fixes a potential DoS issue\n [tor-5934, tor-6007]. \n\nFor the stable distribution (squeeze), these problems have been fixed in\nversion 0.2.2.39-1. \n\nFor the unstable distribution, these problems have been fixed in version\n0.2.3.22-rc-1. \n\nWe recommend that you upgrade your tor packages. ----------------------------------------------------------------------\n\nThe final version of the CSI 6.0 has been released. \nFind out why this is not just another Patch Management solution: http://secunia.com/blog/325/\n\n----------------------------------------------------------------------\n\nTITLE:\nDebian update for tor\n\nSECUNIA ADVISORY ID:\nSA50583\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/50583/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50583\n\nRELEASE DATE:\n2012-09-14\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/50583/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/50583/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50583\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nDebian has issued an update for tor. \n\nORIGINAL ADVISORY:\nDSA-2548-1:\nhttp://www.debian.org/security/2012/dsa-2548\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2012-3518" }, { "db": "JVNDB", "id": "JVNDB-2012-003894" }, { "db": "CNVD", "id": "CNVD-2012-4391" }, { "db": "BID", "id": "55128" }, { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "119351" }, { "db": "PACKETSTORM", "id": "116520" }, { "db": "PACKETSTORM", "id": "116554" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-3518", "trust": 3.6 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2012/08/21/6", "trust": 1.6 }, { "db": "SECUNIA", "id": "50583", "trust": 1.1 }, { "db": "BID", "id": "55128", "trust": 0.9 }, { "db": "JVNDB", "id": "JVNDB-2012-003894", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2012-4391", "trust": 0.6 }, { "db": "NSFOCUS", "id": "20408", "trust": 0.6 }, { "db": "MLIST", "id": "[OSS-SECURITY] 20120821 RE: CVE REQUEST -- TOR 0.2.2.38: THREE ISSUES", "trust": 0.6 }, { "db": "MLIST", "id": "[TOR-ANNOUNCE] 20120819 TOR 0.2.2.38 IS RELEASED", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201208-381", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "121258", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "119351", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "116520", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "116554", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-4391" }, { "db": "BID", "id": "55128" }, { "db": "JVNDB", "id": "JVNDB-2012-003894" }, { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "119351" }, { "db": "PACKETSTORM", "id": "116520" }, { "db": "PACKETSTORM", "id": "116554" }, { "db": "CNNVD", "id": "CNNVD-201208-381" }, { "db": "NVD", "id": "CVE-2012-3518" } ] }, "id": "VAR-201208-0158", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2012-4391" } ], "trust": 1.00865386 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-4391" } ] }, "last_update_date": "2024-11-23T21:46:09.967000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "openSUSE-SU-2012:1068", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "title": "Tor 0.2.2.38 is released", "trust": 0.8, "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "title": "tor.git / commit - Avoid possible segfault when handling networkstatus vote with bad flavor", "trust": 0.8, "url": "https://gitweb.torproject.org/tor.git/commit/57e35ad3d91724882c345ac709666a551a977f0f" }, { "title": "tor.git / commit - Clarify security impact of bug 6530", "trust": 0.8, "url": "https://gitweb.torproject.org/tor.git/commit/55f635745afacefffdaafc72cc176ca7ab817546" }, { "title": "Ticket #6530", "trust": 0.8, "url": "https://trac.torproject.org/projects/tor/ticket/6530" }, { "title": "Tor uninitialized memory read vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/20311" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-4391" }, { "db": "JVNDB", "id": "JVNDB-2012-003894" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003894" }, { "db": "NVD", "id": "CVE-2012-3518" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://trac.torproject.org/projects/tor/ticket/6530" }, { "trust": 1.6, "url": "https://lists.torproject.org/pipermail/tor-announce/2012-august/000086.html" }, { "trust": 1.6, "url": "https://gitweb.torproject.org/tor.git/commit/57e35ad3d91724882c345ac709666a551a977f0f" }, { "trust": 1.6, "url": "https://gitweb.torproject.org/tor.git/commit/55f635745afacefffdaafc72cc176ca7ab817546" }, { "trust": 1.6, "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "trust": 1.1, "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "trust": 1.0, "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "trust": 1.0, "url": "http://secunia.com/advisories/50583" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3518" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3518" }, { "trust": 0.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849949http" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/55128" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/20408" }, { "trust": 0.3, "url": "http://marc.info/?l=oss-security\u0026m=134555757608675\u0026w=2" }, { "trust": 0.3, "url": "http://www.torproject.org/index.html.en" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3519" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4419" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3518" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3517" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5573" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2769" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2768" }, { "trust": 0.1, "url": "https://wiki.mageia.org/en/support/advisories/mgasa-2012-0276" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/" }, { "trust": 0.1, "url": "https://wiki.mageia.org/en/support/advisories/mgaa-2012-0184" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/advisories/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2768" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5573" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3519" }, { "trust": 0.1, "url": "https://wiki.mageia.org/en/support/advisories/mgasa-2012-0356" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2769" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4419" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3517" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4922" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3517" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5573" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3519" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4922" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3518" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4419" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50583" }, { "trust": 0.1, "url": "http://secunia.com/advisories/50583/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/50583/#comments" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/blog/325/" }, { "trust": 0.1, "url": "http://www.debian.org/security/2012/dsa-2548" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-4391" }, { "db": "BID", "id": "55128" }, { "db": "JVNDB", "id": "JVNDB-2012-003894" }, { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "119351" }, { "db": "PACKETSTORM", "id": "116520" }, { "db": "PACKETSTORM", "id": "116554" }, { "db": "CNNVD", "id": "CNNVD-201208-381" }, { "db": "NVD", "id": "CVE-2012-3518" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2012-4391" }, { "db": "BID", "id": "55128" }, { "db": "JVNDB", "id": "JVNDB-2012-003894" }, { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "119351" }, { "db": "PACKETSTORM", "id": "116520" }, { "db": "PACKETSTORM", "id": "116554" }, { "db": "CNNVD", "id": "CNNVD-201208-381" }, { "db": "NVD", "id": "CVE-2012-3518" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-08-23T00:00:00", "db": "CNVD", "id": "CNVD-2012-4391" }, { "date": "2012-08-21T00:00:00", "db": "BID", "id": "55128" }, { "date": "2012-08-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-003894" }, { "date": "2013-04-11T02:39:54", "db": "PACKETSTORM", "id": "121258" }, { "date": "2013-01-09T02:25:38", "db": "PACKETSTORM", "id": "119351" }, { "date": "2012-09-14T01:52:39", "db": "PACKETSTORM", "id": "116520" }, { "date": "2012-09-14T04:04:24", "db": "PACKETSTORM", "id": "116554" }, { "date": "2012-08-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201208-381" }, { "date": "2012-08-26T03:17:44.090000", "db": "NVD", "id": "CVE-2012-3518" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-08-23T00:00:00", "db": "CNVD", "id": "CNVD-2012-4391" }, { "date": "2015-04-13T21:39:00", "db": "BID", "id": "55128" }, { "date": "2012-10-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-003894" }, { "date": "2012-08-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201208-381" }, { "date": "2024-11-21T01:41:02.720000", "db": "NVD", "id": "CVE-2012-3518" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "121258" }, { "db": "CNNVD", "id": "CNNVD-201208-381" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor of routerparse.c Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003894" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201208-381" } ], "trust": 0.6 } }
var-201012-0256
Vulnerability from variot
Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors. Tor is an implementation of the second generation of onion routing, through which users can communicate anonymously over the Internet. Tor is prone to an unspecified heap-based buffer-overflow vulnerability because it fails to properly validate user-supplied input. Failed exploit attempts will likely result in denial-of-service conditions. No additional information is available.
Workaround
There is no known workaround at this time.
Resolution
All Tor users should upgrade to the latest stable version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.1.28"
References
[ 1 ] CVE-2010-1676 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1676
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201101-02.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. ----------------------------------------------------------------------
Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM).
Request a free trial: http://secunia.com/products/corporate/vim/
TITLE: Tor Unspecified Buffer Overflow Vulnerability
SECUNIA ADVISORY ID: SA42536
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/42536/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=42536
RELEASE DATE: 2010-12-28
DISCUSS ADVISORY: http://secunia.com/advisories/42536/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/42536/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=42536
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in Tor, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
SOLUTION: Update to version 0.2.1.28.
Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
PROVIDED AND/OR DISCOVERED BY: The vendor credits Willem Pinckaers.
ORIGINAL ADVISORY: https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog http://archives.seul.org/or/announce/Dec-2010/msg00000.html
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. By supplying specially crafted packets a remote attacker can cause Tor to overflow its heap, crashing the process. Arbitrary code execution has not been confirmed but there is a potential risk.
In the stable distribution (lenny), this update also includes an update of the IP address for the Tor directory authority gabelmoo and addresses a weakness in the package's postinst maintainer script.
For the stable distribution (lenny) this problem has been fixed in version 0.2.1.26-1~lenny+4.
For the testing distribution (squeeze) and the unstable distribution (sid), this problem has been fixed in version 0.2.1.26-6.
We recommend that you upgrade your tor packages.
Upgrade instructions
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show ' and http://packages.debian.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk0RRVsACgkQYy49rUbZzlp2mACeP+489ptl1vz0BQoJW1F2w9x4 K4oAnAjVvOvl898mVCeSJRhkKtEXT5nG =eMo2 -----END PGP SIGNATURE----- . This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201012-0256", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.1.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.0.9.1" }, { "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.0.9.10" }, { "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.0.9.2" }, { "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.0.9.3" }, { "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.0.9.4" }, { "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.0.9.5" }, { "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.0.9.6" }, { "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.0.9.7" }, { "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.0.9.8" }, { "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.0.9.9" }, { "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.1.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.1.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.1.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.1.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.1.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.9, "vendor": "tor", "version": "0.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.2_pre23" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.2_pre22" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.2_pre17" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.2_pre24" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.0.2_pre21" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8_alpha" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3_alpha" }, { "model": "tor", "scope": "lte", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.1_alpha-cvs" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5_alpha" }, { "model": "alpha-cvs", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.1.2.1" }, { "model": "tor", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.1.2.15" }, { "model": "tor", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.1.20" }, { "model": "tor", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.1.21" }, { "model": "tor", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.1.22" }, { "model": "tor", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.1.27" }, { "model": "tor", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.118" }, { "model": "tor", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.1.123" }, { "model": "tor", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.31" }, { "model": "tor", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.32" }, { "model": "tor", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.33" }, { "model": "tor", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.34" }, { "model": "tor", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.35" }, { "model": "tor", "scope": "eq", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.20-alpha" }, { "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.x" }, { "model": "0.1.1.1-alpha", "scope": null, "trust": 0.6, "vendor": "tor", "version": null }, { "model": "0.1.1.2-alpha", "scope": null, "trust": 0.6, "vendor": "tor", "version": null }, { "model": "0.1.1.3-alpha", "scope": null, "trust": 0.6, "vendor": "tor", "version": null }, { "model": "0.1.1.4-alpha", "scope": null, "trust": 0.6, "vendor": "tor", "version": null }, { "model": "0.1.1.5-alpha", "scope": null, "trust": 0.6, "vendor": "tor", "version": null }, { "model": "\u003c0.2.2.20-alpha", "scope": null, "trust": 0.6, "vendor": "tor", "version": null }, { "model": "tor", "scope": "eq", "trust": 0.6, "vendor": "tor", "version": "0.2.1.28" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.214" }, { "model": ".5-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".4-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".3-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".2-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": ".1-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.1.1" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.1.28" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-3318" }, { "db": "CNVD", "id": "CNVD-2010-3344" }, { "db": "BID", "id": "45500" }, { "db": "JVNDB", "id": "JVNDB-2010-002937" }, { "db": "CNNVD", "id": "CNNVD-201012-262" }, { "db": "NVD", "id": "CVE-2010-1676" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:torproject:tor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-002937" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Secunia", "sources": [ { "db": "PACKETSTORM", "id": "97609" }, { "db": "PACKETSTORM", "id": "97111" }, { "db": "PACKETSTORM", "id": "97176" }, { "db": "PACKETSTORM", "id": "96954" } ], "trust": 0.4 }, "cve": "CVE-2010-1676", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2010-1676", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2010-1676", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2010-1676", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201012-262", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-002937" }, { "db": "CNNVD", "id": "CNNVD-201012-262" }, { "db": "NVD", "id": "CVE-2010-1676" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors. Tor is an implementation of the second generation of onion routing, through which users can communicate anonymously over the Internet. Tor is prone to an unspecified heap-based buffer-overflow vulnerability because it fails to properly validate user-supplied input. Failed exploit attempts will likely result in denial-of-service conditions. No additional information is available. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Tor users should upgrade to the latest stable version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/tor-0.2.1.28\"\n\nReferences\n==========\n\n [ 1 ] CVE-2010-1676\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1676\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201101-02.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2011 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n. ----------------------------------------------------------------------\n\n\nSecure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM). \n\nRequest a free trial: \nhttp://secunia.com/products/corporate/vim/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nTor Unspecified Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA42536\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/42536/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42536\n\nRELEASE DATE:\n2010-12-28\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/42536/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/42536/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42536\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in Tor, which can be exploited by\nmalicious people to cause a DoS (Denial of Service) and potentially\ncompromise a vulnerable system. \n\nSOLUTION:\nUpdate to version 0.2.1.28. \n\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Willem Pinckaers. \n\nORIGINAL ADVISORY:\nhttps://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog\nhttp://archives.seul.org/or/announce/Dec-2010/msg00000.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. By supplying\nspecially crafted packets a remote attacker can cause Tor to overflow its\nheap, crashing the process. Arbitrary code execution has not been\nconfirmed but there is a potential risk. \n\nIn the stable distribution (lenny), this update also includes an update of\nthe IP address for the Tor directory authority gabelmoo and addresses\na weakness in the package\u0027s postinst maintainer script. \n\n\nFor the stable distribution (lenny) this problem has been fixed in\nversion 0.2.1.26-1~lenny+4. \n\nFor the testing distribution (squeeze) and the unstable distribution (sid),\nthis problem has been fixed in version 0.2.1.26-6. \n\n\nWe recommend that you upgrade your tor packages. \n\nUpgrade instructions\n- --------------------\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show \u003cpkg\u003e\u0027 and http://packages.debian.org/\u003cpkg\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.10 (GNU/Linux)\n\niEYEARECAAYFAk0RRVsACgkQYy49rUbZzlp2mACeP+489ptl1vz0BQoJW1F2w9x4\nK4oAnAjVvOvl898mVCeSJRhkKtEXT5nG\n=eMo2\n-----END PGP SIGNATURE-----\n. This fixes a vulnerability,\nwhich can be exploited by malicious people to cause a DoS (Denial of\nService) and potentially compromise a vulnerable system", "sources": [ { "db": "NVD", "id": "CVE-2010-1676" }, { "db": "JVNDB", "id": "JVNDB-2010-002937" }, { "db": "CNVD", "id": "CNVD-2010-3318" }, { "db": "CNVD", "id": "CNVD-2010-3344" }, { "db": "BID", "id": "45500" }, { "db": "PACKETSTORM", "id": "97561" }, { "db": "PACKETSTORM", "id": "97609" }, { "db": "PACKETSTORM", "id": "97111" }, { "db": "PACKETSTORM", "id": "96937" }, { "db": "PACKETSTORM", "id": "97176" }, { "db": "PACKETSTORM", "id": "96954" } ], "trust": 3.51 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2010-1676", "trust": 4.1 }, { "db": "SECUNIA", "id": "42536", "trust": 2.3 }, { "db": "BID", "id": "45500", "trust": 1.9 }, { "db": "VUPEN", "id": "ADV-2010-3290", "trust": 1.6 }, { "db": "SECTRACK", "id": "1024910", "trust": 1.6 }, { "db": "SECUNIA", "id": "42916", "trust": 1.1 }, { "db": "SECUNIA", "id": "42783", "trust": 1.1 }, { "db": "SECUNIA", "id": "42667", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-0114", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2010-002937", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2010-3318", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2010-3344", "trust": 0.6 }, { "db": "MLIST", "id": "[OR-ANNOUNCE] 20101220 TOR 0.2.1.28 IS RELEASED (SECURITY PATCHES)", "trust": 0.6 }, { "db": "NSFOCUS", "id": "16212", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201012-262", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "97561", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "97609", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "97111", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "96937", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "97176", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "96954", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-3318" }, { "db": "CNVD", "id": "CNVD-2010-3344" }, { "db": "BID", "id": "45500" }, { "db": "JVNDB", "id": "JVNDB-2010-002937" }, { "db": "PACKETSTORM", "id": "97561" }, { "db": "PACKETSTORM", "id": "97609" }, { "db": "PACKETSTORM", "id": "97111" }, { "db": "PACKETSTORM", "id": "96937" }, { "db": "PACKETSTORM", "id": "97176" }, { "db": "PACKETSTORM", "id": "96954" }, { "db": "CNNVD", "id": "CNNVD-201012-262" }, { "db": "NVD", "id": "CVE-2010-1676" } ] }, "id": "VAR-201012-0256", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2010-3318" }, { "db": "CNVD", "id": "CNVD-2010-3344" } ], "trust": 2.2 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 1.2 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-3318" }, { "db": "CNVD", "id": "CNVD-2010-3344" } ] }, "last_update_date": "2024-11-23T22:19:04.844000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "tor-02220-alpha-out-security-patches", "trust": 0.8, "url": "http://blog.torproject.org/blog/tor-02220-alpha-out-security-patches" }, { "title": "tor-02128-released-security-patches", "trust": 0.8, "url": "http://blog.torproject.org/blog/tor-02128-released-security-patches" }, { "title": "Tor Unknown Buffer Buffer Overflow Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/2223" }, { "title": "Tor heap buffer overflow vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/2356" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-3318" }, { "db": "CNVD", "id": "CNVD-2010-3344" }, { "db": "JVNDB", "id": "JVNDB-2010-002937" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-002937" }, { "db": "NVD", "id": "CVE-2010-1676" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/changelog" }, { "trust": 2.0, "url": "http://archives.seul.org/or/announce/dec-2010/msg00000.html" }, { "trust": 1.6, "url": "http://www.vupen.com/english/advisories/2010/3290" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/45500" }, { "trust": 1.6, "url": "http://securitytracker.com/id?1024910" }, { "trust": 1.6, "url": "http://secunia.com/advisories/42536" }, { "trust": 1.6, "url": "http://blog.torproject.org/blog/tor-02220-alpha-out-security-patches" }, { "trust": 1.6, "url": "http://blog.torproject.org/blog/tor-02128-released-security-patches" }, { "trust": 1.1, "url": "http://security.gentoo.org/glsa/glsa-201101-02.xml" }, { "trust": 1.1, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-december/052657.html" }, { "trust": 1.1, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-december/052690.html" }, { "trust": 1.0, "url": "http://www.debian.org/security/2010/dsa-2136" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2011/0114" }, { "trust": 1.0, "url": "http://secunia.com/advisories/42783" }, { "trust": 1.0, "url": "http://secunia.com/advisories/42667" }, { "trust": 1.0, "url": "http://secunia.com/advisories/42916" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1676" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-1676" }, { "trust": 0.6, "url": "http://archives.seul.org/or/announce/dec-2010/msg00000.htmlhttps" }, { "trust": 0.6, "url": "http://secunia.com/advisories/42536http" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/16212" }, { "trust": 0.4, "url": "http://secunia.com/products/corporate/evm/" }, { "trust": 0.4, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.4, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.4, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.4, "url": "http://secunia.com/products/corporate/vim/" }, { "trust": 0.4, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.4, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.3, "url": "http://www.torproject.org/index.html.en" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1676" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42916" }, { "trust": 0.1, "url": "http://www.gentoo.org/security/en/glsa/glsa-201101-02.xml" }, { "trust": 0.1, "url": "http://secunia.com/advisories/42916/#comments" }, { "trust": 0.1, "url": "http://secunia.com/advisories/42916/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42536" }, { "trust": 0.1, "url": "http://secunia.com/advisories/42536/#comments" }, { "trust": 0.1, "url": "http://secunia.com/advisories/42536/" }, { "trust": 0.1, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.1, "url": "http://security.debian.org/" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/42783/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42783" }, { "trust": 0.1, "url": "http://secunia.com/advisories/42783/#comments" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42667" }, { "trust": 0.1, "url": "http://secunia.com/advisories/42667/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/42667/#comments" }, { "trust": 0.1, "url": "http://lists.debian.org/debian-security-announce/2010/msg00187.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-3318" }, { "db": "CNVD", "id": "CNVD-2010-3344" }, { "db": "BID", "id": "45500" }, { "db": "JVNDB", "id": "JVNDB-2010-002937" }, { "db": "PACKETSTORM", "id": "97561" }, { "db": "PACKETSTORM", "id": "97609" }, { "db": "PACKETSTORM", "id": "97111" }, { "db": "PACKETSTORM", "id": "96937" }, { "db": "PACKETSTORM", "id": "97176" }, { "db": "PACKETSTORM", "id": "96954" }, { "db": "CNNVD", "id": "CNNVD-201012-262" }, { "db": "NVD", "id": "CVE-2010-1676" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2010-3318" }, { "db": "CNVD", "id": "CNVD-2010-3344" }, { "db": "BID", "id": "45500" }, { "db": "JVNDB", "id": "JVNDB-2010-002937" }, { "db": "PACKETSTORM", "id": "97561" }, { "db": "PACKETSTORM", "id": "97609" }, { "db": "PACKETSTORM", "id": "97111" }, { "db": "PACKETSTORM", "id": "96937" }, { "db": "PACKETSTORM", "id": "97176" }, { "db": "PACKETSTORM", "id": "96954" }, { "db": "CNNVD", "id": "CNNVD-201012-262" }, { "db": "NVD", "id": "CVE-2010-1676" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-12-21T00:00:00", "db": "CNVD", "id": "CNVD-2010-3318" }, { "date": "2010-12-23T00:00:00", "db": "CNVD", "id": "CNVD-2010-3344" }, { "date": "2010-12-20T00:00:00", "db": "BID", "id": "45500" }, { "date": "2012-03-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-002937" }, { "date": "2011-01-15T19:58:29", "db": "PACKETSTORM", "id": "97561" }, { "date": "2011-01-18T10:42:52", "db": "PACKETSTORM", "id": "97609" }, { "date": "2010-12-28T08:35:56", "db": "PACKETSTORM", "id": "97111" }, { "date": "2010-12-23T14:45:57", "db": "PACKETSTORM", "id": "96937" }, { "date": "2010-12-30T04:57:34", "db": "PACKETSTORM", "id": "97176" }, { "date": "2010-12-25T08:42:40", "db": "PACKETSTORM", "id": "96954" }, { "date": "2010-12-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201012-262" }, { "date": "2010-12-22T01:00:02.687000", "db": "NVD", "id": "CVE-2010-1676" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-12-21T00:00:00", "db": "CNVD", "id": "CNVD-2010-3318" }, { "date": "2010-12-23T00:00:00", "db": "CNVD", "id": "CNVD-2010-3344" }, { "date": "2015-04-16T17:46:00", "db": "BID", "id": "45500" }, { "date": "2012-03-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-002937" }, { "date": "2010-12-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201012-262" }, { "date": "2024-11-21T01:14:58.320000", "db": "NVD", "id": "CVE-2010-1676" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "96937" }, { "db": "CNNVD", "id": "CNNVD-201012-262" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor heap buffer overflow vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2010-3344" }, { "db": "CNNVD", "id": "CNNVD-201012-262" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201012-262" } ], "trust": 0.6 } }
var-201208-0157
Vulnerability from variot
Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests. Tor (The Onion Router) is an implementation of the second generation of onion routing, which allows users to communicate anonymously over the Internet. Tor has a remote vulnerability in its implementation. Multiple denial-of-service vulnerabilities. 2. An information-disclosure vulnerability. 3. An out-of-bounds memory-access vulnerability. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Mandriva Linux Security Advisory MDVSA-2013:132 http://www.mandriva.com/en/support/security/
Package : tor Date : April 10, 2013 Affected: Business Server 1.0
Problem Description:
Updated tor package fixes security vulnerabilities:
Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected (CVE-2011-2768).
Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values (CVE-2011-2769).
routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack (CVE-2012-3519).
Tor before 0.2.2.39, when waiting for a client to renegotiate, allowed it to add bytes to the input buffer, allowing a crash to be caused remotely (tor-5934, tor-6007).
The version of Tor shipped in MBS1 did not have correctly formed systemd unit and thus failed to start.
This updated version corrects this problem and restores working behaviour.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2768 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2769 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3517 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3518 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3519 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4419 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5573 https://wiki.mageia.org/en/Support/Advisories/MGAA-2012-0184 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0276 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0356
Updated Packages:
Mandriva Business Server 1/X86_64: 8cadc920e4452cd2a3551a3cb01d9fcf mbs1/x86_64/tor-0.2.2.39-1.mbs1.x86_64.rpm 7cbba7170bc4f9e6ee8409398437570c mbs1/SRPMS/tor-0.2.2.39-1.mbs1.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFRZVsDmqjQ0CJFipgRAm9IAJ9tYUVrI7u2V+7yJGNLn2OVMdOzcACgyrhf PUIroe88x4NDpj7AUyd2YP8= =x4YG -----END PGP SIGNATURE-----
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201301-03
http://security.gentoo.org/
Severity: Normal Title: Tor: Multiple vulnerabilities Date: January 08, 2013 Bugs: #432188, #434882, #444804 ID: 201301-03
Synopsis
Multiple vulnerabilities have been found in Tor, allowing attackers to cause Denial of Service or obtain sensitive information. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All Tor users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.3.25"
References
[ 1 ] CVE-2012-3517 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3517 [ 2 ] CVE-2012-3518 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3518 [ 3 ] CVE-2012-3519 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3519 [ 4 ] CVE-2012-4419 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4419 [ 5 ] CVE-2012-4922 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4922 [ 6 ] CVE-2012-5573 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5573
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201301-03.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201208-0157", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "lte", "trust": 1.0, "vendor": "tor", "version": "0.2.2.37" }, { "model": "tor", "scope": "eq", "trust": 0.9, "vendor": "tor", "version": "0.2.2.37" }, { "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.38" }, { "model": "tor", "scope": "eq", "trust": 0.6, "vendor": "tor", "version": "0.2.x" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.225" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.224" }, { "model": ".21-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".20-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".19-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".18-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".17-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".16-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".15-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".14-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2.34" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1x8664" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.2.38" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-4470" }, { "db": "BID", "id": "55128" }, { "db": "JVNDB", "id": "JVNDB-2012-003893" }, { "db": "CNNVD", "id": "CNNVD-201208-380" }, { "db": "NVD", "id": "CVE-2012-3517" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:torproject:tor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003893" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Arma, Asn, and Nickm", "sources": [ { "db": "BID", "id": "55128" }, { "db": "CNNVD", "id": "CNNVD-201208-380" } ], "trust": 0.9 }, "cve": "CVE-2012-3517", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2012-3517", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-3517", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-3517", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201208-380", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003893" }, { "db": "CNNVD", "id": "CNNVD-201208-380" }, { "db": "NVD", "id": "CVE-2012-3517" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests. Tor (The Onion Router) is an implementation of the second generation of onion routing, which allows users to communicate anonymously over the Internet. Tor has a remote vulnerability in its implementation. Multiple denial-of-service vulnerabilities. \n2. An information-disclosure vulnerability. \n3. An out-of-bounds memory-access vulnerability. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n _______________________________________________________________________\n\n Mandriva Linux Security Advisory MDVSA-2013:132\n http://www.mandriva.com/en/support/security/\n _______________________________________________________________________\n\n Package : tor\n Date : April 10, 2013\n Affected: Business Server 1.0\n _______________________________________________________________________\n\n Problem Description:\n\n Updated tor package fixes security vulnerabilities:\n \n Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS\n certificate chain as part of an outgoing OR connection, which allows\n remote relays to bypass intended anonymity properties by reading this\n chain and then determining the set of entry guards that the client\n or bridge had selected (CVE-2011-2768). \n \n Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE\n and CREATE_FAST values in the Command field of a cell within an OR\n connection that it initiated, which allows remote relays to enumerate\n bridges by using these values (CVE-2011-2769). \n \n routerlist.c in Tor before 0.2.2.38 uses a different amount of time\n for relay-list iteration depending on which relay is chosen, which\n might allow remote attackers to obtain sensitive information about\n relay selection via a timing side-channel attack (CVE-2012-3519). \n \n Tor before 0.2.2.39, when waiting for a client to renegotiate, allowed\n it to add bytes to the input buffer, allowing a crash to be caused\n remotely (tor-5934, tor-6007). \n \n The version of Tor shipped in MBS1 did not have correctly formed\n systemd unit and thus failed to start. \n \n This updated version corrects this problem and restores working\n behaviour. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2768\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2769\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3517\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3518\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3519\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4419\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5573\n https://wiki.mageia.org/en/Support/Advisories/MGAA-2012-0184\n https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0276\n https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0356\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 1/X86_64:\n 8cadc920e4452cd2a3551a3cb01d9fcf mbs1/x86_64/tor-0.2.2.39-1.mbs1.x86_64.rpm \n 7cbba7170bc4f9e6ee8409398437570c mbs1/SRPMS/tor-0.2.2.39-1.mbs1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/en/support/security/advisories/\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niD8DBQFRZVsDmqjQ0CJFipgRAm9IAJ9tYUVrI7u2V+7yJGNLn2OVMdOzcACgyrhf\nPUIroe88x4NDpj7AUyd2YP8=\n=x4YG\n-----END PGP SIGNATURE-----\n\n\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201301-03\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Tor: Multiple vulnerabilities\n Date: January 08, 2013\n Bugs: #432188, #434882, #444804\n ID: 201301-03\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Tor, allowing attackers to\ncause Denial of Service or obtain sensitive information. Please review the\nCVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Tor users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/tor-0.2.3.25\"\n\nReferences\n==========\n\n[ 1 ] CVE-2012-3517\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3517\n[ 2 ] CVE-2012-3518\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3518\n[ 3 ] CVE-2012-3519\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3519\n[ 4 ] CVE-2012-4419\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4419\n[ 5 ] CVE-2012-4922\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4922\n[ 6 ] CVE-2012-5573\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5573\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201301-03.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2013 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2012-3517" }, { "db": "JVNDB", "id": "JVNDB-2012-003893" }, { "db": "CNVD", "id": "CNVD-2012-4470" }, { "db": "BID", "id": "55128" }, { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "119351" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-3517", "trust": 3.5 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2012/08/21/6", "trust": 1.6 }, { "db": "BID", "id": "55128", "trust": 1.5 }, { "db": "JVNDB", "id": "JVNDB-2012-003893", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2012-4470", "trust": 0.6 }, { "db": "NSFOCUS", "id": "20408", "trust": 0.6 }, { "db": "MLIST", "id": "[OSS-SECURITY] 20120821 RE: CVE REQUEST -- TOR 0.2.2.38: THREE ISSUES", "trust": 0.6 }, { "db": "MLIST", "id": "[TOR-ANNOUNCE] 20120819 TOR 0.2.2.38 IS RELEASED", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201208-380", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "121258", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "119351", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-4470" }, { "db": "BID", "id": "55128" }, { "db": "JVNDB", "id": "JVNDB-2012-003893" }, { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "119351" }, { "db": "CNNVD", "id": "CNNVD-201208-380" }, { "db": "NVD", "id": "CVE-2012-3517" } ] }, "id": "VAR-201208-0157", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2012-4470" } ], "trust": 1.00865386 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-4470" } ] }, "last_update_date": "2024-11-23T21:46:10.274000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "openSUSE-SU-2012:1068", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "title": "Bug 849949", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849949" }, { "title": "Tor 0.2.2.38 is released", "trust": 0.8, "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "title": "tor.git / commit", "trust": 0.8, "url": "https://gitweb.torproject.org/tor.git/commit/62637fa22405278758febb1743da9af562524d4c" }, { "title": "Ticket #6480", "trust": 0.8, "url": "https://trac.torproject.org/projects/tor/ticket/6480" }, { "title": "Tor denies service patch vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/20698" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-4470" }, { "db": "JVNDB", "id": "JVNDB-2012-003893" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003893" }, { "db": "NVD", "id": "CVE-2012-3517" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://trac.torproject.org/projects/tor/ticket/6480" }, { "trust": 1.6, "url": "https://lists.torproject.org/pipermail/tor-announce/2012-august/000086.html" }, { "trust": 1.6, "url": "https://gitweb.torproject.org/tor.git/commit/62637fa22405278758febb1743da9af562524d4c" }, { "trust": 1.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849949" }, { "trust": 1.6, "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "trust": 1.2, "url": "http://www.securityfocus.com/bid/55128" }, { "trust": 1.1, "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "trust": 1.0, "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "trust": 1.0, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-september/088006.html" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3517" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3517" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/20408" }, { "trust": 0.3, "url": "http://marc.info/?l=oss-security\u0026m=134555757608675\u0026w=2" }, { "trust": 0.3, "url": "http://www.torproject.org/index.html.en" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3519" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4419" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3517" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3518" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5573" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2769" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3518" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2768" }, { "trust": 0.1, "url": "https://wiki.mageia.org/en/support/advisories/mgasa-2012-0276" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/" }, { "trust": 0.1, "url": "https://wiki.mageia.org/en/support/advisories/mgaa-2012-0184" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/advisories/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2768" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5573" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3519" }, { "trust": 0.1, "url": "https://wiki.mageia.org/en/support/advisories/mgasa-2012-0356" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2769" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4419" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4922" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3517" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5573" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3519" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4922" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3518" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4419" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-4470" }, { "db": "BID", "id": "55128" }, { "db": "JVNDB", "id": "JVNDB-2012-003893" }, { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "119351" }, { "db": "CNNVD", "id": "CNNVD-201208-380" }, { "db": "NVD", "id": "CVE-2012-3517" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2012-4470" }, { "db": "BID", "id": "55128" }, { "db": "JVNDB", "id": "JVNDB-2012-003893" }, { "db": "PACKETSTORM", "id": "121258" }, { "db": "PACKETSTORM", "id": "119351" }, { "db": "CNNVD", "id": "CNNVD-201208-380" }, { "db": "NVD", "id": "CVE-2012-3517" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-08-28T00:00:00", "db": "CNVD", "id": "CNVD-2012-4470" }, { "date": "2012-08-21T00:00:00", "db": "BID", "id": "55128" }, { "date": "2012-08-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-003893" }, { "date": "2013-04-11T02:39:54", "db": "PACKETSTORM", "id": "121258" }, { "date": "2013-01-09T02:25:38", "db": "PACKETSTORM", "id": "119351" }, { "date": "2012-08-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201208-380" }, { "date": "2012-08-26T03:17:44.043000", "db": "NVD", "id": "CVE-2012-3517" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-08-28T00:00:00", "db": "CNVD", "id": "CNVD-2012-4470" }, { "date": "2015-04-13T21:39:00", "db": "BID", "id": "55128" }, { "date": "2012-10-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-003893" }, { "date": "2012-08-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201208-380" }, { "date": "2024-11-21T01:41:02.587000", "db": "NVD", "id": "CVE-2012-3517" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "121258" }, { "db": "CNNVD", "id": "CNNVD-201208-380" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor of dns.c Denial of service in Japan ( Daemon crash ) Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003893" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201208-380" } ], "trust": 0.6 } }
var-201101-0396
Vulnerability from variot
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (assertion failure and daemon exit) via blobs that trigger a certain file size, as demonstrated by the cached-descriptors.new file. Tor is a second generation of onion routing implementation. Tor is prone to multiple denial-of-service vulnerabilities. Attackers can exploit these issues to crash the affected computer, denying service to legitimate users. These issues affect versions prior to Tor 0.2.1.29, 0.2.2, and 0.2.2.21-alpha. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201110-13
http://security.gentoo.org/
Severity: High Title: Tor: Multiple vulnerabilities Date: October 18, 2011 Bugs: #351920, #359789 ID: 201110-13
Synopsis
Multiple vulnerabilities were found in Tor, the most severe of which may allow a remote attacker to execute arbitrary code.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/tor < 0.2.1.30 >= 0.2.1.30
Description
Multiple vulnerabilities have been discovered in Tor. Please review the CVE identifiers referenced below for details.
Impact
A remote unauthenticated attacker may be able to execute arbitrary code with the privileges of the Tor process or create a Denial of Service.
Workaround
There is no known workaround at this time.
Resolution
All Tor users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.1.30"
NOTE: This is a legacy GLSA. Updates for all affected architectures are available since April 2, 2011. It is likely that your system is already no longer affected by this issue.
References
[ 1 ] CVE-2011-0015 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0015 [ 2 ] CVE-2011-0016 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0016 [ 3 ] CVE-2011-0427 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0427 [ 4 ] CVE-2011-0490 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0490 [ 5 ] CVE-2011-0491 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0491 [ 6 ] CVE-2011-0492 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0492 [ 7 ] CVE-2011-0493 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0493 [ 8 ] CVE-2011-1924 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1924
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201110-13.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201101-0396", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.1.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.6, "vendor": "tor", "version": "0.2.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.27" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.3, "vendor": "tor", "version": "0.2.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.33" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.32" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.2" }, { "model": "tor", "scope": "lte", "trust": 1.0, "vendor": "tor", "version": "0.2.1.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre27" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.28" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.22" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.30" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.10" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.14" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.35" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.6" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.34" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.13" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre23" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.3" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.24" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.21" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.12" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.19" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.31" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.16" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.29" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.4" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.17" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.2_pre26" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.7" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.18" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.2.20" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.1.25" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.8" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.2.9" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.2" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.2.0.15" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1.5" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.0.11" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.1.1" }, { "model": "tor", "scope": "eq", "trust": 1.0, "vendor": "tor", "version": "0.0.9.8" }, { "model": "tor", "scope": "eq", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.21-alpha" }, { "model": "tor", "scope": "lt", "trust": 0.8, "vendor": "the tor", "version": "0.2.2.x" }, { "model": "tor", "scope": "lt", "trust": 0.6, "vendor": "tor", "version": "0.2.1.29" }, { "model": ".20-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".19-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".18-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".17-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".16-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".15-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": ".14-alpha", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "eq", "trust": 0.3, "vendor": "tor", "version": "0.2.1.28" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": ".21-alpha", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.2" }, { "model": "tor", "scope": "ne", "trust": 0.3, "vendor": "tor", "version": "0.2.1.29" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0309" }, { "db": "BID", "id": "45953" }, { "db": "JVNDB", "id": "JVNDB-2011-004136" }, { "db": "CNNVD", "id": "CNNVD-201101-223" }, { "db": "NVD", "id": "CVE-2011-0492" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:torproject:tor", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004136" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor", "sources": [ { "db": "BID", "id": "45953" } ], "trust": 0.3 }, "cve": "CVE-2011-0492", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2011-0492", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-0492", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-0492", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201101-223", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004136" }, { "db": "CNNVD", "id": "CNNVD-201101-223" }, { "db": "NVD", "id": "CVE-2011-0492" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (assertion failure and daemon exit) via blobs that trigger a certain file size, as demonstrated by the cached-descriptors.new file. Tor is a second generation of onion routing implementation. Tor is prone to multiple denial-of-service vulnerabilities. \nAttackers can exploit these issues to crash the affected computer, denying service to legitimate users. \nThese issues affect versions prior to Tor 0.2.1.29, 0.2.2, and 0.2.2.21-alpha. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201110-13\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: Tor: Multiple vulnerabilities\n Date: October 18, 2011\n Bugs: #351920, #359789\n ID: 201110-13\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities were found in Tor, the most severe of which\nmay allow a remote attacker to execute arbitrary code. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/tor \u003c 0.2.1.30 \u003e= 0.2.1.30\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Tor. Please review the\nCVE identifiers referenced below for details. \n\nImpact\n======\n\nA remote unauthenticated attacker may be able to execute arbitrary code\nwith the privileges of the Tor process or create a Denial of Service. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Tor users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/tor-0.2.1.30\"\n\nNOTE: This is a legacy GLSA. Updates for all affected architectures are\navailable since April 2, 2011. It is likely that your system is already\nno longer affected by this issue. \n\nReferences\n==========\n\n[ 1 ] CVE-2011-0015\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0015\n[ 2 ] CVE-2011-0016\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0016\n[ 3 ] CVE-2011-0427\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0427\n[ 4 ] CVE-2011-0490\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0490\n[ 5 ] CVE-2011-0491\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0491\n[ 6 ] CVE-2011-0492\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0492\n[ 7 ] CVE-2011-0493\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0493\n[ 8 ] CVE-2011-1924\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1924\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201110-13.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2011 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n", "sources": [ { "db": "NVD", "id": "CVE-2011-0492" }, { "db": "JVNDB", "id": "JVNDB-2011-004136" }, { "db": "CNVD", "id": "CNVD-2011-0309" }, { "db": "BID", "id": "45953" }, { "db": "PACKETSTORM", "id": "105951" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-0492", "trust": 3.4 }, { "db": "BID", "id": "45953", "trust": 1.3 }, { "db": "JVNDB", "id": "JVNDB-2011-004136", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2011-0309", "trust": 0.6 }, { "db": "MLIST", "id": "[OR-ANNOUNCE] 20110117 TOR 0.2.1.29 IS RELEASED (SECURITY PATCHES)", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201101-223", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "105951", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0309" }, { "db": "BID", "id": "45953" }, { "db": "JVNDB", "id": "JVNDB-2011-004136" }, { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201101-223" }, { "db": "NVD", "id": "CVE-2011-0492" } ] }, "id": "VAR-201101-0396", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2011-0309" } ], "trust": 1.00865386 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0309" } ] }, "last_update_date": "2024-11-23T22:09:02.216000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "tor-02129-released-security-patches", "trust": 0.8, "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "title": "Tor allows remote attackers to patch patches for data corruption by modifying certain file sizes in the cached-descriptors.new file", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/2712" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0309" }, { "db": "JVNDB", "id": "JVNDB-2011-004136" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004136" }, { "db": "NVD", "id": "CVE-2011-0492" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://trac.torproject.org/projects/tor/ticket/2326" }, { "trust": 1.9, "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/changelog" }, { "trust": 1.9, "url": "http://archives.seul.org/or/announce/jan-2011/msg00000.html" }, { "trust": 1.9, "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64867" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/45953" }, { "trust": 0.9, "url": "https://trac.torproject.org/projects/tor/ticket/2190" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0492" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0492" }, { "trust": 0.3, "url": "https://trac.torproject.org/projects/tor/ticket/2352" }, { "trust": 0.3, "url": "https://trac.torproject.org/projects/tor/ticket/2324" }, { "trust": 0.3, "url": "http://www.torproject.org/index.html.en" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0016" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0493" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0493" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0016" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0490" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0015" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0490" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0491" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0492" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1924" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0015" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0491" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1924" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0492" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201110-13.xml" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0309" }, { "db": "BID", "id": "45953" }, { "db": "JVNDB", "id": "JVNDB-2011-004136" }, { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201101-223" }, { "db": "NVD", "id": "CVE-2011-0492" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2011-0309" }, { "db": "BID", "id": "45953" }, { "db": "JVNDB", "id": "JVNDB-2011-004136" }, { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201101-223" }, { "db": "NVD", "id": "CVE-2011-0492" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-01-24T00:00:00", "db": "CNVD", "id": "CNVD-2011-0309" }, { "date": "2011-01-21T00:00:00", "db": "BID", "id": "45953" }, { "date": "2012-03-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-004136" }, { "date": "2011-10-18T19:42:05", "db": "PACKETSTORM", "id": "105951" }, { "date": "2011-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201101-223" }, { "date": "2011-01-19T12:00:20.657000", "db": "NVD", "id": "CVE-2011-0492" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-01-24T00:00:00", "db": "CNVD", "id": "CNVD-2011-0309" }, { "date": "2015-05-07T17:19:00", "db": "BID", "id": "45953" }, { "date": "2012-03-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-004136" }, { "date": "2011-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201101-223" }, { "date": "2024-11-21T01:24:07.800000", "db": "NVD", "id": "CVE-2011-0492" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "105951" }, { "db": "CNNVD", "id": "CNNVD-201101-223" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tor Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-004136" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201101-223" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://blog.torproject.org/blog/tor-02234-released-security-patches | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.torproject.org/blog/tor-02234-released-security-patches | Patch, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.1.1 | |
tor | tor | 0.2.1.1.2 | |
tor | tor | 0.2.1.1.3 | |
tor | tor | 0.2.1.1.4 | |
tor | tor | 0.2.1.1.5 | |
tor | tor | 0.2.1.1.6 | |
tor | tor | 0.2.1.1.7 | |
tor | tor | 0.2.1.1.8 | |
tor | tor | 0.2.1.1.9 | |
tor | tor | 0.2.1.1.10 | |
tor | tor | 0.2.1.1.11 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.1.1.22 | |
tor | tor | 0.2.1.1.23 | |
tor | tor | 0.2.1.1.24 | |
tor | tor | 0.2.1.1.25 | |
tor | tor | 0.2.1.1.26 | |
tor | tor | 0.2.1.1.27 | |
tor | tor | 0.2.1.1.28 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.1.28 | |
tor | tor | 0.2.1.29 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 | |
tor | tor | 0.2.2.29 | |
tor | tor | 0.2.2.29 | |
tor | tor | 0.2.2.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A1ABD3E-1901-4DF7-9236-A21777840950", "versionEndIncluding": "0.2.2.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "E149062A-F48E-4E99-8A3C-B32FFC922695", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "67AF751E-3C14-4B67-9E24-DBD14E00D72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "02525A8C-2384-409C-8D94-13D8E30904EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "04955D07-0755-473C-AD6A-1AC5B158E387", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "810D53DA-CACC-4432-B8E5-C42464B316C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "334049F0-332B-4736-B0C9-45B0C1289F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "9F8D1841-FDBB-4507-B092-F41C49285B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "02937401-0114-4D9C-9FDE-E299CC55FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "59C66307-DB75-40C2-8AB6-538C9E35E141", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "1BBF6A17-43CC-4E14-AC2F-DC6C46B98A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "E511EB2D-7E75-45BC-B446-4CD0FFB7016E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC7FC78-6BD8-427E-937D-BD6B4ED7FADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "0B9D629C-8D14-490B-A7FA-E765F51226EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "EB0956E0-5A7F-4DA5-8F71-2226EDE9A9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "54AE55C4-F3C2-403A-B581-A7E174F6FC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "D5ABB714-CF7E-44F5-BB4F-C428CB3D14FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "25C41E2D-3C63-4F83-8EF0-99DDA656C276", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "5EF7556A-8845-4515-A760-024552EDACD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "DB6D57D7-E9C7-47D6-AC84-09960BC07723", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "B081491D-3080-4EDA-9A48-64CF13DE0F81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "142C73E5-B6A1-4D12-832D-01CF3BB5DC8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "281100EE-90F3-4814-B5E7-F625A84293FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "3FD46698-2192-4467-910C-8C859E00F889", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.29:beta:*:*:*:*:*:*", "matchCriteriaId": "AB3AABD7-3A09-4D00-8FDB-3955A5290926", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.32:*:*:*:*:*:*:*", "matchCriteriaId": "24BC210B-6E30-4EF6-A6AA-86493E5F54C7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.34, when configured as a bridge, uses direct DirPort access instead of a Tor TLS connection for a directory fetch, which makes it easier for remote attackers to enumerate bridges by observing DirPort connections." }, { "lang": "es", "value": "Las versiones de Tor anteriores a v0.2.2.34, cuando son configuradas en modo puente, utilizan el acceso directo a DirPort en vez de una conexi\u00f3n TLS a Tor para un directorio localizado, lo cual puede provocar que un atacante remoto pueda obtener una lista de los puentes por medio de la observaci\u00f3n de las conexiones a trav\u00e9s del puerto DirPort." } ], "id": "CVE-2011-4894", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-23T03:59:22.067", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C390EF7-1A08-4BAD-8DA5-8402AA2AB7AE", "versionEndIncluding": "0.2.0.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.0.34 treats incomplete IPv4 addresses as valid, which has unknown impact and attack vectors related to \"Spec conformance,\" as demonstrated using 192.168.0." }, { "lang": "es", "value": "Tor anterior a v0.2.0.34 trata direcciones IPv4 incompletas como validas, lo que tiene un impacto desconocido y vectores de ataque relacionados con \"Spec conformance,\" como se ha demostrado utilizando 192.168.0." } ], "id": "CVE-2009-0939", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-03-18T02:00:08.233", "references": [ { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33880" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34583" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/33713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/33713" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.1.1 | |
tor | tor | 0.2.1.1.2 | |
tor | tor | 0.2.1.1.3 | |
tor | tor | 0.2.1.1.4 | |
tor | tor | 0.2.1.1.5 | |
tor | tor | 0.2.1.1.6 | |
tor | tor | 0.2.1.1.7 | |
tor | tor | 0.2.1.1.8 | |
tor | tor | 0.2.1.1.9 | |
tor | tor | 0.2.1.1.10 | |
tor | tor | 0.2.1.1.11 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.1.1.22 | |
tor | tor | 0.2.1.1.23 | |
tor | tor | 0.2.1.1.24 | |
tor | tor | 0.2.1.1.25 | |
tor | tor | 0.2.1.1.26 | |
tor | tor | 0.2.1.1.27 | |
tor | tor | 0.2.1.1.28 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.1.28 | |
tor | tor | 0.2.1.29 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 | |
tor | tor | 0.2.2.29 | |
tor | tor | 0.2.2.29 | |
tor | tor | 0.2.2.32 | |
tor | tor | 0.2.2.33 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD951703-0E72-48AE-B16F-408BFE2B638E", "versionEndIncluding": "0.2.2.34", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "E149062A-F48E-4E99-8A3C-B32FFC922695", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "67AF751E-3C14-4B67-9E24-DBD14E00D72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "02525A8C-2384-409C-8D94-13D8E30904EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "04955D07-0755-473C-AD6A-1AC5B158E387", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "810D53DA-CACC-4432-B8E5-C42464B316C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "334049F0-332B-4736-B0C9-45B0C1289F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "9F8D1841-FDBB-4507-B092-F41C49285B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "02937401-0114-4D9C-9FDE-E299CC55FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "59C66307-DB75-40C2-8AB6-538C9E35E141", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "1BBF6A17-43CC-4E14-AC2F-DC6C46B98A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "E511EB2D-7E75-45BC-B446-4CD0FFB7016E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC7FC78-6BD8-427E-937D-BD6B4ED7FADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "0B9D629C-8D14-490B-A7FA-E765F51226EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "EB0956E0-5A7F-4DA5-8F71-2226EDE9A9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "54AE55C4-F3C2-403A-B581-A7E174F6FC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "D5ABB714-CF7E-44F5-BB4F-C428CB3D14FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "25C41E2D-3C63-4F83-8EF0-99DDA656C276", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "5EF7556A-8845-4515-A760-024552EDACD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "DB6D57D7-E9C7-47D6-AC84-09960BC07723", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "B081491D-3080-4EDA-9A48-64CF13DE0F81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "142C73E5-B6A1-4D12-832D-01CF3BB5DC8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "281100EE-90F3-4814-B5E7-F625A84293FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "3FD46698-2192-4467-910C-8C859E00F889", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.29:beta:*:*:*:*:*:*", "matchCriteriaId": "AB3AABD7-3A09-4D00-8FDB-3955A5290926", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.32:*:*:*:*:*:*:*", "matchCriteriaId": "24BC210B-6E30-4EF6-A6AA-86493E5F54C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.33:*:*:*:*:*:*:*", "matchCriteriaId": "E7B83A6E-9C87-4E79-94C6-E61EE5584F84", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de buffer de memoria din\u00e1mica en versiones anteriores a v0.2.2.35 de Tor que permite a atacantes remotos causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o una posible ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n mediante (1) el establecimiento de una conexi\u00f3n STOKS a un puerto SocksPort o (2) aprovechando una configuraci\u00f3n de proxy STOKS." } ], "id": "CVE-2011-2778", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-23T03:59:22.020", "references": [ { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2363" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02235-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2363" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02235-released-security-patches" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 does not sufficiently obey certain firewall options, which allows remote attackers to bypass intended access restrictions for dirservers, direct connections, or proxy servers." }, { "lang": "es", "value": "Tor anterior a 0.1.1.20 no sigue correctamente determinadas opciones del cortafuegos, esto permite a atacantes remotos evitar las restricciones de acceso pretendidas para los dirservers (servidores de directorios), conexiones directas o servidores proxy." } ], "id": "CVE-2006-3412", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25874" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25874" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
scatterchat | scatterchat | * | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scatterchat:scatterchat:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A31047A-47A2-4D8D-B5C3-ABBB213FB0EE", "versionEndIncluding": "1.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in (1) Tor 0.1.0.x before 0.1.0.18 and 0.1.1.x before 0.1.1.23, and (2) ScatterChat before 1.0.2, allows remote attackers operating a Tor entry node to route arbitrary Tor traffic through clients or cause a denial of service (flood) via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en (1) Tor 0.1.0.x anteriores a 0.1.0.18 y 0.1.1.x anteriores a 0.1.1.23, y (2) ScatterChat anterior a 1.0.2, permite a atacantes remotos operando un \"nodo de entrada\" en la red Tor encaminar tr\u00e1fico Tor de su elecci\u00f3n a trav\u00e9s de clientes o causar una denegaci\u00f3n de acceso (inundaci\u00f3n) mediante vectores no especificados.\r\n\r\n" } ], "evaluatorSolution": "This vulenrability is addressed in the following product release:\r\nTor, Tor, 0.1.1.23, and later\r\nScatterchat, Scatterchat, 1.0.2", "id": "CVE-2006-4508", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-08-31T23:04:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Aug-2006/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21708" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21725" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory", "URL Repurposed" ], "url": "http://www.scatterchat.com/advisories/2006-02_tech.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/19785" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28686" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Aug-2006/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21708" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21725" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory", "URL Repurposed" ], "url": "http://www.scatterchat.com/advisories/2006-02_tech.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/19785" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28686" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.14 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.2.15 can select a guard node beyond the first listed never-before-connected-to guard node, which allows remote attackers with control of certain guard nodes to obtain sensitive information and possibly leverage further attacks." }, { "lang": "es", "value": "Tor anterior a 0.1.2.15 podr\u00eda seleccionar un nodo guard\u00eda m\u00e1s all\u00e1 del nodo protector\r\nnunca-antes-conectar-a, el cual podr\u00eda permitir a atacantes remotos con control sobre ciertos nodos guarda obtener informaci\u00f3n sensible y posiblemente llevar a cabo ataques adicionales." } ], "id": "CVE-2007-4099", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-30T21:17:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/46971" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26140" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25035" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/46971" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25035" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2634" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5284A61-BC5E-414D-BCFD-3844D0478CC1", "versionEndIncluding": "0.1.1.26", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor does not verify a node\u0027s uptime and bandwidth advertisements, which allows remote attackers who operate a low resource node to make false claims of greater resources, which places the node into use for many circuits and compromises the anonymity of traffic sources and destinations." }, { "lang": "es", "value": "Tor no verifica el tiempo de funcionamiento y los anuncios de ancho de banda, lo cual permite a atacantes remotos que operan un nodo con bajos recursos afirmar que poseen recursos mayores, lo cual pone el nodo en uso para muchos circuitos y compromete el anonimato de las fuentes y los destinos del tr\u00e1fico." } ], "id": "CVE-2007-1103", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-02-26T17:28:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/talk/Feb-2007/msg00197.html" }, { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/talk/Feb-2007/msg00200.html" }, { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/talk/Feb-2007/msg00202.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/45249" }, { "source": "cve@mitre.org", "url": "http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/talk/Feb-2007/msg00197.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/talk/Feb-2007/msg00200.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/talk/Feb-2007/msg00202.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/45249" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.0.35 allows remote attackers to cause a denial of service (application crash) via a malformed router descriptor." }, { "lang": "es", "value": "Tor anterior a v0.2.0.35 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (cuelgue de aplicaci\u00f3n) a trav\u00e9s de un descriptor de enrutador (router) malformado." } ], "id": "CVE-2009-2425", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-07-10T17:30:00.343", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35546" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.osvdb.org/55340" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/35505" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1716" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51376" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35546" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.osvdb.org/55340" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/35505" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1716" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51376" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "D87D8965-CE3A-457E-AD9D-C8EE68F538A4", "versionEndIncluding": "0.2.2.37", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack." }, { "lang": "es", "value": "routerlist.c en Tor anterior a v0.2.2.38 utiliza una cantidad diferente de tiempo para la iteraci\u00f3n relay-list dependiendo de que (relay) sea elegido, lo cual podr\u00eda permitir a atacantes remotos obtener informaci\u00f3n sensible sobre la selecci\u00f3n del (relay) a trav\u00e9s de un ataque de tiempo al canal lateral (timing side-channel attack)." } ], "id": "CVE-2012-3519", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-26T03:17:44.153", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/50583" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "source": "secalert@redhat.com", "url": "https://gitweb.torproject.org/tor.git/commit/308f6dad20675c42b29862f4269ad1fbfb00dc9a" }, { "source": "secalert@redhat.com", "url": "https://gitweb.torproject.org/tor.git/commit/d48cebc5e498b0ae673635f40fc57cdddab45d5b" }, { "source": "secalert@redhat.com", "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "source": "secalert@redhat.com", "url": "https://trac.torproject.org/projects/tor/ticket/6537" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/50583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://gitweb.torproject.org/tor.git/commit/308f6dad20675c42b29862f4269ad1fbfb00dc9a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://gitweb.torproject.org/tor.git/commit/d48cebc5e498b0ae673635f40fc57cdddab45d5b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://trac.torproject.org/projects/tor/ticket/6537" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBA88C1D-CC02-4808-B981-DCD64917CD41", "versionEndIncluding": "0.2.1.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly manage key data in memory, which might allow local users to obtain sensitive information by leveraging the ability to read memory that was previously used by a different process." }, { "lang": "es", "value": "Tor en versiones anteriores a la 0.2.1.29 y 0.2.2.x anteriores a la 0.2.2.21-alpha no gestiona apropiadamente datos de clave en memoria, lo que puede permitir a usuarios locales obtener informaci\u00f3n confidencial a trav\u00e9s de la lectura de memoria que ha sido utilizada previamente por un proceso diferente." } ], "id": "CVE-2011-0016", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-19T12:00:19.640", "references": [ { "source": "secalert@redhat.com", "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42905" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42907" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2011/dsa-2148" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2011/01/18/7" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/45832" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1024980" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "source": "secalert@redhat.com", "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "secalert@redhat.com", "url": "https://trac.torproject.org/projects/tor/ticket/2384" }, { "source": "secalert@redhat.com", "url": "https://trac.torproject.org/projects/tor/ticket/2385" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42907" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2011/01/18/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45832" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024980" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://trac.torproject.org/projects/tor/ticket/2384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://trac.torproject.org/projects/tor/ticket/2385" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.1.1 | |
tor | tor | 0.2.1.1.2 | |
tor | tor | 0.2.1.1.3 | |
tor | tor | 0.2.1.1.4 | |
tor | tor | 0.2.1.1.5 | |
tor | tor | 0.2.1.1.6 | |
tor | tor | 0.2.1.1.7 | |
tor | tor | 0.2.1.1.8 | |
tor | tor | 0.2.1.1.9 | |
tor | tor | 0.2.1.1.10 | |
tor | tor | 0.2.1.1.11 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.1.1.22 | |
tor | tor | 0.2.1.1.23 | |
tor | tor | 0.2.1.1.24 | |
tor | tor | 0.2.1.1.25 | |
tor | tor | 0.2.1.1.26 | |
tor | tor | 0.2.1.1.27 | |
tor | tor | 0.2.1.1.28 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.1.28 | |
tor | tor | 0.2.1.29 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 | |
tor | tor | 0.2.2.29 | |
tor | tor | 0.2.2.29 | |
tor | tor | 0.2.2.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A1ABD3E-1901-4DF7-9236-A21777840950", "versionEndIncluding": "0.2.2.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "E149062A-F48E-4E99-8A3C-B32FFC922695", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "67AF751E-3C14-4B67-9E24-DBD14E00D72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "02525A8C-2384-409C-8D94-13D8E30904EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "04955D07-0755-473C-AD6A-1AC5B158E387", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "810D53DA-CACC-4432-B8E5-C42464B316C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "334049F0-332B-4736-B0C9-45B0C1289F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "9F8D1841-FDBB-4507-B092-F41C49285B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "02937401-0114-4D9C-9FDE-E299CC55FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "59C66307-DB75-40C2-8AB6-538C9E35E141", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "1BBF6A17-43CC-4E14-AC2F-DC6C46B98A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "E511EB2D-7E75-45BC-B446-4CD0FFB7016E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC7FC78-6BD8-427E-937D-BD6B4ED7FADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "0B9D629C-8D14-490B-A7FA-E765F51226EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "EB0956E0-5A7F-4DA5-8F71-2226EDE9A9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "54AE55C4-F3C2-403A-B581-A7E174F6FC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "D5ABB714-CF7E-44F5-BB4F-C428CB3D14FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "25C41E2D-3C63-4F83-8EF0-99DDA656C276", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "5EF7556A-8845-4515-A760-024552EDACD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "DB6D57D7-E9C7-47D6-AC84-09960BC07723", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "B081491D-3080-4EDA-9A48-64CF13DE0F81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "142C73E5-B6A1-4D12-832D-01CF3BB5DC8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "281100EE-90F3-4814-B5E7-F625A84293FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "3FD46698-2192-4467-910C-8C859E00F889", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.29:beta:*:*:*:*:*:*", "matchCriteriaId": "AB3AABD7-3A09-4D00-8FDB-3955A5290926", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.32:*:*:*:*:*:*:*", "matchCriteriaId": "24BC210B-6E30-4EF6-A6AA-86493E5F54C7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values." }, { "lang": "es", "value": "Tor antes de v0.2.2.34, cuando se configura como bridge, acepta los valores CREATE y CREATE_FAST en el campo Command de una conexi\u00f3n OR que inicializa, lo que permite a relays remotos enumerar bridges usando esos valores." } ], "id": "CVE-2011-2769", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-23T03:59:21.990", "references": [ { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2331" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBA88C1D-CC02-4808-B981-DCD64917CD41", "versionEndIncluding": "0.2.1.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (assertion failure and daemon exit) via blobs that trigger a certain file size, as demonstrated by the cached-descriptors.new file." }, { "lang": "es", "value": "Tor anterior a v0.2.1.29 y v0.2.2x anterior a 0.2.2.21-alpha permite a atacantes remotos provocar una denegaci\u00f3n de servicio (error de aserci\u00f3n y salida demonio) a trav\u00e9s de gotas que disparan un tama\u00f1o de archivo determinado, como lo demuestra con cached-descriptors.new file." } ], "id": "CVE-2011-0492", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-19T12:00:20.657", "references": [ { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/45953" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64867" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://trac.torproject.org/projects/tor/ticket/2326" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://trac.torproject.org/projects/tor/ticket/2326" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "67A44A79-CE5A-44D7-A6E6-4E7A3AA1DA2C", "versionEndIncluding": "0.1.2.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "E149062A-F48E-4E99-8A3C-B32FFC922695", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.2.16, when ControlPort is enabled, does not properly restrict commands to localhost port 9051, which allows remote attackers to modify the torrc configuration file, compromise anonymity, and have other unspecified impact via HTTP POST data containing commands without valid authentication, as demonstrated by an HTML form (1) hosted on a web site or (2) injected by a Tor exit node." }, { "lang": "es", "value": "Tor versiones anteriores a 0.1.2.16, cuando ControlPort est\u00e1 habilitado, no restringe apropiadamente los comandos al puerto localhost 9051, lo que permite a atacantes remotos modificar el archivo de configuraci\u00f3n de torrc, comprometer el anonimato y presentar otro impacto no especificado por medio de datos POST HTTP que contienen comandos sin autenticaci\u00f3n v\u00e1lida, como es demostrado por un formulario HTML (1) alojado en un sitio web o (2) inyectado por un nodo de salida Tor." } ], "id": "CVE-2007-4174", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-08-07T10:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/announce/Aug-2007/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/announce/Sep-2007/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/36271" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26301" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/25188" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018510" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/2768" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35784" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/announce/Aug-2007/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/announce/Sep-2007/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36271" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26301" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/25188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018510" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/2768" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35784" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36407" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.14 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.2.15 sends \"destroy cells\" containing the reason for tearing down a circuit, which allows remote attackers to obtain sensitive information, contrary to specifications." }, { "lang": "es", "value": "Tor anterior a 0.1.2.15 env\u00eda \"destruir celdas\" conteniendo la raz\u00f3n para derribar un circuito, lo cual podr\u00eda permite a un atacante remoto obtener informaci\u00f3n sensible, contraria a las especificaciones." } ], "id": "CVE-2007-4097", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-30T21:17:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/46969" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26140" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25035" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/46969" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25035" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2634" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.14 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Tor before 0.1.2.15, when using BSD natd support, allows remote attackers to cause a denial of service via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Tor anterior a 0.1.2.15, cuando est\u00e1 siendo utilizado son soporte BSD natd, permite a atacantes remotos provocar denegaci\u00f3n de servicio a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2007-4096", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-30T21:17:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/46968" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26140" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25035" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/46968" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25035" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2634" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBA88C1D-CC02-4808-B981-DCD64917CD41", "versionEndIncluding": "0.2.1.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly check the amount of compression in zlib-compressed data, which allows remote attackers to cause a denial of service via a large compression factor." }, { "lang": "es", "value": "Tor antes de v0.2.1.29 y v0.2.2.x antes de v0.2.2.21-alfa no comprueba correctamente el nivel de compresi\u00f3n de datos de zlib, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de un factor de compresi\u00f3n de gran tama\u00f1o." } ], "id": "CVE-2011-0015", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-19T12:00:06.623", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42905" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42907" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2011/dsa-2148" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2011/01/18/7" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/45832" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1024980" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "secalert@redhat.com", "url": "https://trac.torproject.org/projects/tor/ticket/2324" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42907" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2011/01/18/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45832" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024980" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://trac.torproject.org/projects/tor/ticket/2324" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10_alpha | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.1.1.22 | |
tor | tor | 0.2.1.1.23 | |
tor | tor | 0.2.1.1.24 | |
tor | tor | 0.2.1.1.25 | |
tor | tor | 0.2.1.1.26 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "E25EC348-75E2-48FF-9C4A-033250365CE0", "versionEndIncluding": "0.2.1.1.27", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "EB0956E0-5A7F-4DA5-8F71-2226EDE9A9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "54AE55C4-F3C2-403A-B581-A7E174F6FC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "D5ABB714-CF7E-44F5-BB4F-C428CB3D14FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "25C41E2D-3C63-4F83-8EF0-99DDA656C276", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "5EF7556A-8845-4515-A760-024552EDACD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de Desbordamiento de b\u00fafer basado en mont\u00edculo en Tor before v0.2.1.28 y v0.2.2.x anterior v0.2.2.20-alpha permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de demonio) o probablemente ejecutar c\u00f3digo arbitrario de su elecci\u00f3n a trav\u00e9s de vectores no especificados.\r\n\r\n\r\n" } ], "id": "CVE-2010-1676", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-12-22T01:00:02.687", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Dec-2010/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-02128-released-security-patches" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-02220-alpha-out-security-patches" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052657.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052690.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42536" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/42667" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/42783" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/42916" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-201101-02.xml" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1024910" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2010/dsa-2136" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/45500" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3290" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0114" }, { "source": "cve@mitre.org", "url": "https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Dec-2010/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-02128-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-02220-alpha-out-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052657.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052690.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42783" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42916" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201101-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1024910" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2010/dsa-2136" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45500" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3290" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10_alpha | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB84ADB5-01EA-4ECF-B36E-9CE54E8309C0", "versionEndIncluding": "0.1.2.31", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.0.32 does not properly process the ClientDNSRejectInternalAddresses configuration option in situations where an exit relay issues a policy-based refusal of a stream, which allows remote exit relays to have an unknown impact by mapping an internal IP address to the destination hostname of a refused stream." }, { "lang": "es", "value": "Tor anterior a v0.2.0.32 no procesa adecuadamente la opci\u00f3n de configuraci\u00f3n ClientDNSRejectInternalAddresses en situaciones donde una cuesti\u00f3n en la salida de transmisi\u00f3n de una pol\u00edtica que deniega el flujo, puede permitir a flujos de salida remotos tener un impacto desconocido mediante el mapeo de una direcci\u00f3n IP interna hacia el nombre de host destino de una flujo denegado." } ], "id": "CVE-2008-5398", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-12-09T00:30:00.597", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-0.2.0.32-released" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33025" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34583" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/32648" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/3366" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47102" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-0.2.0.32-released" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/32648" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/3366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47102" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the directory server (dirserver) in Tor before 0.1.1.20 allows remote attackers to cause an unspecified denial of service via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en el servidor de directorios (dirserver) en Tor antes de 0.1.1.20 permite a atacantes remotos provocar una denegaci\u00f3n de servicio no especificada a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2006-3408", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20277" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25883" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/18323" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26794" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25883" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/18323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26794" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10_alpha | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The connection_edge_process_relay_cell_not_open function in src/or/relay.c in Tor 0.2.x before 0.2.0.35 and 0.1.x before 0.1.2.8-beta allows exit relays to have an unspecified impact by causing controllers to accept DNS responses that redirect to an internal IP address via unknown vectors. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "La funci\u00f3n connection_edge_process_relay_cell_not_open en src/or/relay.c en Tor v0.2.x anterior a v0.2.0.35 y v0.1.x anterior a v0.1.2.8-beta\r\npermite a los retransmisores (relays) de salida tener un impacto no especificado al provocar que los controladores acepten respuestas DNS que redirigen a direcciones IP internas a traves de vectores desconocidos. NOTA: algunos de estos detalles se obtienen a partir de informaci\u00f3n de terceros." } ], "id": "CVE-2009-2426", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-07-10T17:30:00.360", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35546" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.osvdb.org/55341" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/35505" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1716" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35546" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.osvdb.org/55341" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/35505" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1716" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51377" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 uses improper logic to validate the \"OR\" destination, which allows remote attackers to perform a man-in-the-middle (MITM) attack via unspecified vectors." }, { "lang": "es", "value": "Tor versiones anteriores a 0.1.1.20 utiliza una l\u00f3gica inapropiada para validar el destino \"OR\", lo cual permite a atacantes remotos llevar a cabo un ataque man-in-the-middle (MITM) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2006-3415", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25878" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25878" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit." } ], "id": "CVE-2005-2643", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-08-23T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://archives.seul.org/or/announce/Aug-2005/msg00002.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=112448002732443\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16424" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1014739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archives.seul.org/or/announce/Aug-2005/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=112448002732443\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16424" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1014739" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBA88C1D-CC02-4808-B981-DCD64917CD41", "versionEndIncluding": "0.2.1.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en Tor anterior a v0.2.1.29 y v0.2.2.x anterior a v0.2.2.21-alpha permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria y bloqueo de la aplicaci\u00f3n) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-0427", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-19T12:00:19.750", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42905" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42907" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2148" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/45832" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1024980" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64748" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42907" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45832" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024980" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64748" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C390EF7-1A08-4BAD-8DA5-8402AA2AB7AE", "versionEndIncluding": "0.2.0.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Tor before 0.2.0.34 allows attackers to cause a denial of service (infinite loop) via \"corrupt votes.\"" }, { "lang": "es", "value": "Vulnerabilidad no especificada en Tor anterior a v0.2.0.34 permite a atacantes provocar una denegaci\u00f3n de servicio (bucle infinito) a trav\u00e9s de \"votos corruptos\"." } ], "id": "CVE-2009-0936", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-03-18T02:00:08.170", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33880" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34583" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/33713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/33713" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10_alpha | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations." }, { "lang": "es", "value": "Tor anteriores a v0.2.1.22, y v0.2.2.x anteriores a v0.2.2.7-alpha, utiliza claves de identidad obsoleto para determinadas autoridades de directorio , lo que facilita ataques \"man-in-the-middle\" para comprometer el anonimato de las fuentes y de los destinos del tr\u00e1fico." } ], "id": "CVE-2010-0383", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-01-25T19:30:01.637", "references": [ { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/announce/Jan-2010/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00161.html" }, { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" }, { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00165.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/61977" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38198" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/37901" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/announce/Jan-2010/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00161.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00165.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/61977" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/37901" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor allows remote attackers to discover the IP address of a hidden service by accessing this service at a high rate, thereby changing the server\u0027s CPU temperature and consequently changing the pattern of time values visible through (1) ICMP timestamps, (2) TCP sequence numbers, and (3) TCP timestamps, a different vulnerability than CVE-2006-0414. NOTE: it could be argued that this is a laws-of-physics vulnerability that is a fundamental design limitation of certain hardware implementations, so perhaps this issue should not be included in CVE." }, { "lang": "es", "value": "Tor permite a atacantes remotos descubrir la direcci\u00f3n IP de un servicio oculto accediendo a este servicio a un alto ritmo de repetici\u00f3n, y por tanto cambiando la temperatura de la CPU y consecuentemente cambiando el patr\u00f3n de valores de tiempo visibles a trav\u00e9s de (1) marcas de tiempo ICMP, (2) n\u00fameros de secuencia TCP, y (3) marcas de tiempo TCP, una vulnerabilidad distinta de CVE-2006-0414. NOTA: podr\u00eda argumentarse que esto es una vulnerabilidad de las leyes de la f\u00edsica que es una limitaci\u00f3n fundamental de dise\u00f1o de determinadas implementaciones de hardware, por tanto quiz\u00e1s este problema no deber\u00eda ser incluido en CVE." } ], "id": "CVE-2006-6893", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf" }, { "source": "cve@mitre.org", "url": "http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-services-by-their-clock-skew/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-services-by-their-clock-skew/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBA88C1D-CC02-4808-B981-DCD64917CD41", "versionEndIncluding": "0.2.1.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The tor_realloc function in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote attackers to cause a denial of service (daemon crash) via unspecified vectors, related to \"underflow errors.\"" }, { "lang": "es", "value": "La funci\u00f3n tor_realloc de Tor en versiones anteriores a la 0.2.1.29 y 0.2.2.x anteriores a la 0.2.2.21-alpha no valida el tama\u00f1o de determinado valor durante la reserva de memoria, lo que puede permitir a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s de vectores sin especificar. Relacioando con errores de \"underflow\"." } ], "id": "CVE-2011-0491", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-19T12:00:20.047", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/45953" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64888" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "cve@mitre.org", "url": "https://trac.torproject.org/projects/tor/ticket/2324" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://trac.torproject.org/projects/tor/ticket/2324" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBA88C1D-CC02-4808-B981-DCD64917CD41", "versionEndIncluding": "0.2.1.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha might allow remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors related to malformed router caches and improper handling of integer values." }, { "lang": "es", "value": "Tor antes de v0.2.1.29 y v0.2.2.x antes de v0.2.2.21-alfa podr\u00eda permitir a atacantes remotos provocar una denegaci\u00f3n de servicio (error de aserci\u00f3n y salida del demonio) a trav\u00e9s de vectores relacionados con caches de Router mal formados y el tratamiento inadecuado de valores enteros." } ], "id": "CVE-2011-0493", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-19T12:00:21.343", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/45953" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64864" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "cve@mitre.org", "url": "https://trac.torproject.org/projects/tor/ticket/2352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64864" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://trac.torproject.org/projects/tor/ticket/2352" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 creates \"internal circuits\" primarily consisting of nodes with \"useful exit nodes,\" which allows remote attackers to conduct unspecified statistical attacks." }, { "lang": "es", "value": "Tor versiones anteriores a 0.1.1.20 crea \"circuitos internos\" principalmente consistentes en nodos con \"nodos de salida \u00fatil\", lo cual permite a atacantes remotos conducir ataques estad\u00edsticamente no especificados." } ], "id": "CVE-2006-3410", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20277" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25882" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/18323" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26798" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25882" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/18323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26798" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.1.1 | |
tor | tor | 0.2.1.1.2 | |
tor | tor | 0.2.1.1.3 | |
tor | tor | 0.2.1.1.4 | |
tor | tor | 0.2.1.1.5 | |
tor | tor | 0.2.1.1.6 | |
tor | tor | 0.2.1.1.7 | |
tor | tor | 0.2.1.1.8 | |
tor | tor | 0.2.1.1.9 | |
tor | tor | 0.2.1.1.10 | |
tor | tor | 0.2.1.1.11 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.1.1.22 | |
tor | tor | 0.2.1.1.23 | |
tor | tor | 0.2.1.1.24 | |
tor | tor | 0.2.1.1.25 | |
tor | tor | 0.2.1.1.26 | |
tor | tor | 0.2.1.1.27 | |
tor | tor | 0.2.1.1.28 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.1.28 | |
tor | tor | 0.2.1.29 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 | |
tor | tor | 0.2.2.29 | |
tor | tor | 0.2.2.29 | |
tor | tor | 0.2.2.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A1ABD3E-1901-4DF7-9236-A21777840950", "versionEndIncluding": "0.2.2.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "E149062A-F48E-4E99-8A3C-B32FFC922695", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "67AF751E-3C14-4B67-9E24-DBD14E00D72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "02525A8C-2384-409C-8D94-13D8E30904EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "04955D07-0755-473C-AD6A-1AC5B158E387", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "810D53DA-CACC-4432-B8E5-C42464B316C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "334049F0-332B-4736-B0C9-45B0C1289F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "9F8D1841-FDBB-4507-B092-F41C49285B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "02937401-0114-4D9C-9FDE-E299CC55FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "59C66307-DB75-40C2-8AB6-538C9E35E141", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "1BBF6A17-43CC-4E14-AC2F-DC6C46B98A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "E511EB2D-7E75-45BC-B446-4CD0FFB7016E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC7FC78-6BD8-427E-937D-BD6B4ED7FADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "0B9D629C-8D14-490B-A7FA-E765F51226EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "EB0956E0-5A7F-4DA5-8F71-2226EDE9A9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "54AE55C4-F3C2-403A-B581-A7E174F6FC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "D5ABB714-CF7E-44F5-BB4F-C428CB3D14FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "25C41E2D-3C63-4F83-8EF0-99DDA656C276", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "5EF7556A-8845-4515-A760-024552EDACD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "DB6D57D7-E9C7-47D6-AC84-09960BC07723", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "B081491D-3080-4EDA-9A48-64CF13DE0F81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "142C73E5-B6A1-4D12-832D-01CF3BB5DC8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "281100EE-90F3-4814-B5E7-F625A84293FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "3FD46698-2192-4467-910C-8C859E00F889", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.29:beta:*:*:*:*:*:*", "matchCriteriaId": "AB3AABD7-3A09-4D00-8FDB-3955A5290926", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.32:*:*:*:*:*:*:*", "matchCriteriaId": "24BC210B-6E30-4EF6-A6AA-86493E5F54C7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected." }, { "lang": "es", "value": "Tor, antes de v0.2.2.34, cuando se configura como cliente o bridge, env\u00eda una cadena de certificado TLS como parte de una conexi\u00f3n saliente OR, lo que permite a relays remotos evitar la anonimidad intencionada cuando se determina un conjunto de guardas de entrada seleccionadas por el cliente o bridge." } ], "id": "CVE-2011-2768", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-23T03:59:21.957", "references": [ { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2331" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.14 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.2.15 does not properly distinguish \"streamids from different exits,\" which might allow remote attackers with control over Tor routers to inject cells into arbitrary streams." }, { "lang": "es", "value": "Tor anterior a 0.1.2.15 no distingue de forma adecuada \"identificadores de tr\u00e1fico de diversas salidas,\" lo cual podr\u00eda permitir a atacantes remotos con control sobre los routers Tor inyectar celdas dentro de tr\u00e1fico de su elecci\u00f3n." } ], "id": "CVE-2007-4098", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-30T21:17:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/46970" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26140" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25035" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/46970" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25035" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2634" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor 0.2.2.x before 0.2.2.7-alpha, when functioning as a directory mirror, does not prevent logging of the client IP address upon detection of erroneous client behavior, which might make it easier for local users to discover the identities of clients in opportunistic circumstances by reading log files." }, { "lang": "es", "value": "Tor v0.2.2.x anterior a v0.2.2.7-alpha, cuando est\u00e1 funcionando como espejo de directorio, no previene el acceso a la direcci\u00f3n IP cliente al detectar un comportamiento err\u00f3neo del cliente, lo que podr\u00eda facilitar a usuarios locales descubrir las identidades de los clientes en circunstancias favorables, leyendo sus ficheros de registro." } ], "id": "CVE-2010-0384", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-01-25T19:30:01.667", "references": [ { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 allows remote attackers to spoof log entries or possibly execute shell code via strings with non-printable characters." }, { "lang": "es", "value": "Tor versiones anteriores a la 0.1.1.20 permite a atacantes remotos falsificar entradas de log o posiblemente ejecutar c\u00f3digo por consola a trav\u00e9s de cadenas de caracteres no imprimibles." } ], "id": "CVE-2006-3407", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20277" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19795" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26793" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19795" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26793" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.2.1_alpha-cvs |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.2.14 can construct circuits in which an entry guard is in the same family as the exit node, which might compromise the anonymity of traffic sources and destinations by exposing traffic to inappropriate remote observers." }, { "lang": "es", "value": "Tor anterior a 0.1.2.14 puede construir circuitos en los cuales un protector de entrada est\u00e1 en la misma familia que el nodo de la salida, lo cual puede comprometer el anonimato de las fuentes y de los destinatarios del tr\u00e1fico exponiendo tr\u00e1fico a los observadores remotos inadecuados." } ], "id": "CVE-2007-3165", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-06-11T22:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/announce/May-2007/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/35670" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/25415" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/24180" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/1964" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/announce/May-2007/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/35670" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/25415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/24180" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1964" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 supports server descriptors that contain hostnames instead of IP addresses, which allows remote attackers to arbitrarily group users by providing preferential address resolution." }, { "lang": "es", "value": "Tor anterior a 0.1.1.20 soporta descriptores de servidor que contienen nombres de equipos en lugar de direcciones IP, lo que permite a los atacantes remotos, agrupar usuarios de forma arbitraria, facilitando la resoluci\u00f3n de direcciones preferencial.\r\n\r\n" } ], "id": "CVE-2006-3414", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25877" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25877" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor client before 0.1.1.20 prefers entry points based on is_fast or is_stable flags, which could allow remote attackers to be preferred over nodes that are identified as more trustworthy \"entry guard\" (is_guard) systems by directory authorities." }, { "lang": "es", "value": "El Cliente Tor, anterior a 0.1.1.20, prefiere puntos de entrada basados en las banderas is_fast o is_stable, que permitir\u00eda a atacantes remotos ser preferidos sobre los nodos que est\u00e1n identificados como sistemas m\u00e1s confiables \"entry guard\" (is_guard) por las autoridades de directorio." } ], "id": "CVE-2006-3417", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25879" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://blog.torproject.org/blog/tor-02225-alpha-out | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.torproject.org/blog/tor-02225-alpha-out | Patch, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.1.1 | |
tor | tor | 0.2.1.1.2 | |
tor | tor | 0.2.1.1.3 | |
tor | tor | 0.2.1.1.4 | |
tor | tor | 0.2.1.1.5 | |
tor | tor | 0.2.1.1.6 | |
tor | tor | 0.2.1.1.7 | |
tor | tor | 0.2.1.1.8 | |
tor | tor | 0.2.1.1.9 | |
tor | tor | 0.2.1.1.10 | |
tor | tor | 0.2.1.1.11 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.1.1.22 | |
tor | tor | 0.2.1.1.23 | |
tor | tor | 0.2.1.1.24 | |
tor | tor | 0.2.1.1.25 | |
tor | tor | 0.2.1.1.26 | |
tor | tor | 0.2.1.1.27 | |
tor | tor | 0.2.1.1.28 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.1.28 | |
tor | tor | 0.2.1.29 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 | |
tor | tor | 0.2.2.23 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC9EE1A-FAD7-40FB-A4E7-9916432977F3", "versionEndIncluding": "0.2.2.24", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "E149062A-F48E-4E99-8A3C-B32FFC922695", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "67AF751E-3C14-4B67-9E24-DBD14E00D72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "02525A8C-2384-409C-8D94-13D8E30904EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "04955D07-0755-473C-AD6A-1AC5B158E387", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "810D53DA-CACC-4432-B8E5-C42464B316C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "334049F0-332B-4736-B0C9-45B0C1289F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "9F8D1841-FDBB-4507-B092-F41C49285B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "02937401-0114-4D9C-9FDE-E299CC55FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "59C66307-DB75-40C2-8AB6-538C9E35E141", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "1BBF6A17-43CC-4E14-AC2F-DC6C46B98A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "E511EB2D-7E75-45BC-B446-4CD0FFB7016E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC7FC78-6BD8-427E-937D-BD6B4ED7FADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "0B9D629C-8D14-490B-A7FA-E765F51226EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "EB0956E0-5A7F-4DA5-8F71-2226EDE9A9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "54AE55C4-F3C2-403A-B581-A7E174F6FC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "D5ABB714-CF7E-44F5-BB4F-C428CB3D14FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "25C41E2D-3C63-4F83-8EF0-99DDA656C276", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "5EF7556A-8845-4515-A760-024552EDACD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "DB6D57D7-E9C7-47D6-AC84-09960BC07723", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "B081491D-3080-4EDA-9A48-64CF13DE0F81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "142C73E5-B6A1-4D12-832D-01CF3BB5DC8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "281100EE-90F3-4814-B5E7-F625A84293FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "012F5070-0619-4F0D-A446-E59B9B7703CC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.25-alpha, when configured as a relay without the Nickname configuration option, uses the local hostname as the Nickname value, which allows remote attackers to obtain potentially sensitive information by reading this value." }, { "lang": "es", "value": "Las versiones de Tor anteriores a v0.2.2.25-alpha, cuando son configuradas en modo reenvio (relay) sin la opci\u00f3n de configuraci\u00f3n de Nickname (apodo), utilizan el nombre del equipo local como Nickname (apodo), lo cual permite a atacantes remotos potenciales obtener informaci\u00f3n sensible a trav\u00e9s de la lectura de este valor." } ], "id": "CVE-2011-4897", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-23T03:59:22.177", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02225-alpha-out" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02225-alpha-out" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 does not validate that a server descriptor\u0027s fingerprint line matches its identity key, which allows remote attackers to spoof the fingerprint line, which might be trusted by users or other applications." }, { "lang": "es", "value": "" } ], "id": "CVE-2006-3418", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25881" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10_alpha | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.1.1.1 | |
tor | tor | 0.2.1.1.2 | |
tor | tor | 0.2.1.1.3 | |
tor | tor | 0.2.1.1.4 | |
tor | tor | 0.2.1.1.5 | |
tor | tor | 0.2.1.1.6 | |
tor | tor | 0.2.1.1.7 | |
tor | tor | 0.2.1.1.8 | |
tor | tor | 0.2.1.1.9 | |
tor | tor | 0.2.1.1.10 | |
tor | tor | 0.2.1.1.11 | |
tor | tor | 0.2.1.1.12 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "C30E2B05-BD01-4F0B-9EDF-7701B6A14848", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:*:alpha:*:*:*:*:*:*", "matchCriteriaId": "821649FD-593C-47B8-874E-C3F8F6BC6E5F", "versionEndIncluding": "0.2.0.32", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "67AF751E-3C14-4B67-9E24-DBD14E00D72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "02525A8C-2384-409C-8D94-13D8E30904EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "04955D07-0755-473C-AD6A-1AC5B158E387", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "810D53DA-CACC-4432-B8E5-C42464B316C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "334049F0-332B-4736-B0C9-45B0C1289F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "9F8D1841-FDBB-4507-B092-F41C49285B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "02937401-0114-4D9C-9FDE-E299CC55FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "59C66307-DB75-40C2-8AB6-538C9E35E141", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "1BBF6A17-43CC-4E14-AC2F-DC6C46B98A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "E511EB2D-7E75-45BC-B446-4CD0FFB7016E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC7FC78-6BD8-427E-937D-BD6B4ED7FADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "0B9D629C-8D14-490B-A7FA-E765F51226EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Tor before 0.2.0.33 has unspecified impact and remote attack vectors that trigger heap corruption." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en Tor anterior a v0.2.0.33 tiene un impacto y vectores de ataque desconocidos que lanzan una corrupci\u00f3n de mont\u00edculo (heap)." } ], "id": "CVE-2009-0414", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-02-03T23:30:01.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://archives.seul.org/or/announce/Jan-2009/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.torproject.org/blog/tor-0.2.0.33-stable-released" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33635" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/33677" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34583" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/33399" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021633" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/0210" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00902.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.seul.org/or/announce/Jan-2009/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.torproject.org/blog/tor-0.2.0.33-stable-released" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33635" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/33677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/33399" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/0210" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00902.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C390EF7-1A08-4BAD-8DA5-8402AA2AB7AE", "versionEndIncluding": "0.2.0.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en Tor anterior a v0.2.0.34 permite replicaciones de directorio que provocan una denegaci\u00f3n de servicio a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2009-0937", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-03-18T02:00:08.203", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33880" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34583" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/33713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/33713" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBA88C1D-CC02-4808-B981-DCD64917CD41", "versionEndIncluding": "0.2.1.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha makes calls to Libevent within Libevent log handlers, which might allow remote attackers to cause a denial of service (daemon crash) via vectors that trigger certain log messages." }, { "lang": "es", "value": "Tor antes de v0.2.1.29 y v0.2.2.x antes de v0.2.2.21-alfa realiza llamadas a libevent dentro de manejadores de log de libevent, que podr\u00eda permitir a atacantes remotos provocar una denegaci\u00f3n de servicio (por ca\u00edda del demonio) a trav\u00e9s de vectores que lanzan ciertos mensajes de log." } ], "id": "CVE-2011-0490", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-19T12:00:19.920", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/45953" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64889" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "cve@mitre.org", "url": "https://trac.torproject.org/projects/tor/ticket/2190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://trac.torproject.org/projects/tor/ticket/2190" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in Tor before 0.1.0.10 allows remote attackers to read arbitrary memory and possibly key information from the exit server\u0027s process space." } ], "id": "CVE-2005-2050", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-06-28T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jun-2005/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=96320" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/15764/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200506-18.xml" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21093" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jun-2005/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=96320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/15764/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200506-18.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21093" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.1.1 | |
tor | tor | 0.2.1.1.2 | |
tor | tor | 0.2.1.1.3 | |
tor | tor | 0.2.1.1.4 | |
tor | tor | 0.2.1.1.5 | |
tor | tor | 0.2.1.1.6 | |
tor | tor | 0.2.1.1.7 | |
tor | tor | 0.2.1.1.8 | |
tor | tor | 0.2.1.1.9 | |
tor | tor | 0.2.1.1.10 | |
tor | tor | 0.2.1.1.11 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.1.1.22 | |
tor | tor | 0.2.1.1.23 | |
tor | tor | 0.2.1.1.24 | |
tor | tor | 0.2.1.1.25 | |
tor | tor | 0.2.1.1.26 | |
tor | tor | 0.2.1.1.27 | |
tor | tor | 0.2.1.1.28 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.1.28 | |
tor | tor | 0.2.1.29 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:alpha:*:*:*:*:*:*", "matchCriteriaId": "01CF8C55-D712-4EB3-ABCD-A79161F0FD86", "versionEndIncluding": "0.2.2.23", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "E149062A-F48E-4E99-8A3C-B32FFC922695", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "67AF751E-3C14-4B67-9E24-DBD14E00D72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "02525A8C-2384-409C-8D94-13D8E30904EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "04955D07-0755-473C-AD6A-1AC5B158E387", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "810D53DA-CACC-4432-B8E5-C42464B316C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "334049F0-332B-4736-B0C9-45B0C1289F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "9F8D1841-FDBB-4507-B092-F41C49285B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "02937401-0114-4D9C-9FDE-E299CC55FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "59C66307-DB75-40C2-8AB6-538C9E35E141", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "1BBF6A17-43CC-4E14-AC2F-DC6C46B98A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "E511EB2D-7E75-45BC-B446-4CD0FFB7016E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC7FC78-6BD8-427E-937D-BD6B4ED7FADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "0B9D629C-8D14-490B-A7FA-E765F51226EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "EB0956E0-5A7F-4DA5-8F71-2226EDE9A9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "54AE55C4-F3C2-403A-B581-A7E174F6FC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "D5ABB714-CF7E-44F5-BB4F-C428CB3D14FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "25C41E2D-3C63-4F83-8EF0-99DDA656C276", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "5EF7556A-8845-4515-A760-024552EDACD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "DB6D57D7-E9C7-47D6-AC84-09960BC07723", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "B081491D-3080-4EDA-9A48-64CF13DE0F81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "142C73E5-B6A1-4D12-832D-01CF3BB5DC8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "281100EE-90F3-4814-B5E7-F625A84293FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port." }, { "lang": "es", "value": "Las versiones de Tor anteriores a v0.2.2.24-alpha continua utilizando un puerto en modo bridge que ya sido configurado previamente, pero que no ha sido configurado en el momento actual, lo cual podr\u00eda permitir a atacantes remotos obtener informaci\u00f3n sensible sobre clientes en determinadas circusntancias por medio de la monitorizaci\u00f3n del tr\u00e1fico de red que llega al puerto configurado en modo bridge." } ], "id": "CVE-2011-4896", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-23T03:59:22.130", "references": [ { "source": "cve@mitre.org", "url": "https://blog.torproject.org/blog/tor-02224-alpha-out" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://blog.torproject.org/blog/tor-02224-alpha-out" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:alpha:*:*:*:*:*:*", "matchCriteriaId": "95A5691B-621A-4B7D-8F83-2C95DF30EF60", "versionEndIncluding": "0.2.0.34", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor 0.2.0.28, and probably 0.2.0.34 and earlier, allows remote attackers, with control of an entry router and an exit router, to confirm that a sender and receiver are communicating via vectors involving (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, and then observing cell recognition errors at the exit router. NOTE: the vendor disputes the significance of this issue, noting that the product\u0027s design \"accepted end-to-end correlation as an attack that is too expensive to solve.\"" }, { "lang": "es", "value": "Tor v0.2.0.28, y posiblemente v0.2.0.34 y anteriores, permite a atacantes remotos, con el control de un enrutador de salida y otro de entrada, confirmar que un receptor y un remitente estan comunicandose a traves de los vectores (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, y despues observar los errores de reconocimiento de celula en el enrutador de salida. NOTA: El vendedor no esta de acuerda con la importancia de este hecho." } ], "id": "CVE-2009-0654", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-02-20T19:30:00.313", "references": [ { "source": "cve@mitre.org", "url": "http://blog.torproject.org/blog/one-cell-enough" }, { "source": "cve@mitre.org", "url": "http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Fu" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://blog.torproject.org/blog/one-cell-enough" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Fu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C390EF7-1A08-4BAD-8DA5-8402AA2AB7AE", "versionEndIncluding": "0.2.0.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service (exit node crash) via \"malformed input.\"" }, { "lang": "es", "value": "Vulnerabilidad no especificada en Tor anterior a v0.2.0.34 permite replicaciones de directorios que provocan una denegaci\u00f3n de servicio (ca\u00edda de nodo de salida) a trav\u00e9s \"entrada malformada\"." } ], "id": "CVE-2009-0938", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-03-18T02:00:08.217", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33880" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34583" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/33713" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/33713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49323" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in Tor before 0.1.1.20 allows remote attackers to execute arbitrary code via crafted large inputs, which result in a buffer overflow when elements are added to smartlists." }, { "lang": "es", "value": "Desbordamiento de entero en Tor versiones anteriores a la 0.1.1.20, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de entradas largas manipuladas, lo cual provoca un desbordamiento de b\u00fafer cuando se a\u00f1aden elementos a las smartlists" } ], "id": "CVE-2006-3409", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20277" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/18323" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26795" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/18323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26795" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 allows remote attackers to identify hidden services via a malicious Tor server that attempts a large number of accesses of the hidden service, which eventually causes a circuit to be built through the malicious server." }, { "lang": "es", "value": "Tor anterior a 0.1.1.10 permite a atacantes remotos identificar servicios ocultos mediante un servidor Tor malicioso que intenta un gran n\u00famero de accesos al servicio oculto, lo que acaba causando que un circuito sea construido a trav\u00e9s del servidor malicioso." } ], "id": "CVE-2006-0414", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-01-25T11:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.seul.org/or/announce/Jan-2006/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18576" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/22689" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/18323" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19795" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.seul.org/or/announce/Jan-2006/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18576" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/22689" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/18323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19795" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24285" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "D87D8965-CE3A-457E-AD9D-C8EE68F538A4", "versionEndIncluding": "0.2.2.37", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests." }, { "lang": "es", "value": "Vulnerabilidad de liberaci\u00f3n despu\u00e9s de uso en dns.c en Tor anterior a 0.2.2.38 podr\u00eda permitir a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s de vectores relacionados con solicitudes fallidas de DNS." } ], "id": "CVE-2012-3517", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-26T03:17:44.043", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849949" }, { "source": "secalert@redhat.com", "url": "https://gitweb.torproject.org/tor.git/commit/62637fa22405278758febb1743da9af562524d4c" }, { "source": "secalert@redhat.com", "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://trac.torproject.org/projects/tor/ticket/6480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849949" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://gitweb.torproject.org/tor.git/commit/62637fa22405278758febb1743da9af562524d4c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://trac.torproject.org/projects/tor/ticket/6480" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks." }, { "lang": "es", "value": "Tor versiones anteriores a la 0.1.1.20 utiliza bytes pseudo aleatorios OpenSSL (RAND_pseudo_bytes) en vez de RAND_bytes que son criptogr\u00e1ficamente fuertes y genera el valor de entrop\u00eda al arranque con fragmentos de 160 bits sin regeneraci\u00f3n de semillas, lo cual facilita a los atacantes llevar a cabo ataques de adivinaci\u00f3n por fuerza bruta." } ], "id": "CVE-2006-3419", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25880" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 kills the circuit when it receives an unrecognized relay command, which causes network circuits to be disbanded. NOTE: while this item is listed under the \"Security fixes\" section of the developer changelog, the developer clarified on 20060707 that this is only a self-DoS. Therefore this issue should not be included in CVE" }, { "lang": "es", "value": "** CUESTIONADA ** Tor anterior a 0.1.1.20 cancela el circuito cuando recibe un comando de transmitir err\u00f3neo, lo que provoca que los circuitos de la red sean desconectados. NOTA: Mientras que este elemento aparece listado bajo la secci\u00f3n \"Soluciones de seguridad\" del Log de cambios del desarrollador, el mismo aclara en 20060707 que esto es solamente un Self-DoS. Por consiguiente este asunto no ser\u00e1 incluido en CVE. \r\n\r\n" } ], "id": "CVE-2006-3416", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://blog.torproject.org/blog/tor-02234-released-security-patches | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.torproject.org/blog/tor-02234-released-security-patches | Patch, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.1.1 | |
tor | tor | 0.2.1.1.2 | |
tor | tor | 0.2.1.1.3 | |
tor | tor | 0.2.1.1.4 | |
tor | tor | 0.2.1.1.5 | |
tor | tor | 0.2.1.1.6 | |
tor | tor | 0.2.1.1.7 | |
tor | tor | 0.2.1.1.8 | |
tor | tor | 0.2.1.1.9 | |
tor | tor | 0.2.1.1.10 | |
tor | tor | 0.2.1.1.11 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.1.1.22 | |
tor | tor | 0.2.1.1.23 | |
tor | tor | 0.2.1.1.24 | |
tor | tor | 0.2.1.1.25 | |
tor | tor | 0.2.1.1.26 | |
tor | tor | 0.2.1.1.27 | |
tor | tor | 0.2.1.1.28 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.1.28 | |
tor | tor | 0.2.1.29 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 | |
tor | tor | 0.2.2.29 | |
tor | tor | 0.2.2.29 | |
tor | tor | 0.2.2.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A1ABD3E-1901-4DF7-9236-A21777840950", "versionEndIncluding": "0.2.2.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "E149062A-F48E-4E99-8A3C-B32FFC922695", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "67AF751E-3C14-4B67-9E24-DBD14E00D72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "02525A8C-2384-409C-8D94-13D8E30904EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "04955D07-0755-473C-AD6A-1AC5B158E387", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "810D53DA-CACC-4432-B8E5-C42464B316C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "334049F0-332B-4736-B0C9-45B0C1289F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "9F8D1841-FDBB-4507-B092-F41C49285B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "02937401-0114-4D9C-9FDE-E299CC55FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "59C66307-DB75-40C2-8AB6-538C9E35E141", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "1BBF6A17-43CC-4E14-AC2F-DC6C46B98A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "E511EB2D-7E75-45BC-B446-4CD0FFB7016E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC7FC78-6BD8-427E-937D-BD6B4ED7FADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "0B9D629C-8D14-490B-A7FA-E765F51226EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "EB0956E0-5A7F-4DA5-8F71-2226EDE9A9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "54AE55C4-F3C2-403A-B581-A7E174F6FC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "D5ABB714-CF7E-44F5-BB4F-C428CB3D14FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "25C41E2D-3C63-4F83-8EF0-99DDA656C276", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "5EF7556A-8845-4515-A760-024552EDACD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "DB6D57D7-E9C7-47D6-AC84-09960BC07723", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "B081491D-3080-4EDA-9A48-64CF13DE0F81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "142C73E5-B6A1-4D12-832D-01CF3BB5DC8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "281100EE-90F3-4814-B5E7-F625A84293FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "3FD46698-2192-4467-910C-8C859E00F889", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.29:beta:*:*:*:*:*:*", "matchCriteriaId": "AB3AABD7-3A09-4D00-8FDB-3955A5290926", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.32:*:*:*:*:*:*:*", "matchCriteriaId": "24BC210B-6E30-4EF6-A6AA-86493E5F54C7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building." }, { "lang": "es", "value": "Las versiones de Tor anteriores a v0.2.2.34 cuando es configurado en modo puente, establece un circuito a trav\u00e9s de un proceso diferente al que es utilizado por el cliente, lo cual podr\u00eda permitir f\u00e1cilmente a atacantes remotos obtener una lista de los puntes por medio de la observaci\u00f3n del circuito que se ha construido." } ], "id": "CVE-2011-4895", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-23T03:59:22.097", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys." }, { "lang": "es", "value": "Presentaciones (handshake) TLS en Tor anteriores a 0.1.1.20 generan claves p\u00fablicas-privadas basadas m\u00e1s en el contexto TLS que en la conexi\u00f3n, lo que facilita a los atacantes remotos realizar ataques de fuerza bruta contra las llaves cifradas." } ], "id": "CVE-2006-3411", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25876" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "D87D8965-CE3A-457E-AD9D-C8EE68F538A4", "versionEndIncluding": "0.2.2.37", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted (1) vote document or (2) consensus document." }, { "lang": "es", "value": "La funci\u00f3n networkstatus_parse_vote_from_string en routerparse.c en Tor anterior a v0.2.2.38 no maneja adecuadamente un (flavor name), lo cual podr\u00eda permitir a atacantes remotos causar una denegaci\u00f3n de servicio (lectura fuera de rango y ca\u00edda del demonio) a trav\u00e9s de (1) un documento de voto o (2) un documento de consenso manipulados." } ], "id": "CVE-2012-3518", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-26T03:17:44.090", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/50583" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "source": "secalert@redhat.com", "url": "https://gitweb.torproject.org/tor.git/commit/55f635745afacefffdaafc72cc176ca7ab817546" }, { "source": "secalert@redhat.com", "url": "https://gitweb.torproject.org/tor.git/commit/57e35ad3d91724882c345ac709666a551a977f0f" }, { "source": "secalert@redhat.com", "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "source": "secalert@redhat.com", "url": "https://trac.torproject.org/projects/tor/ticket/6530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/50583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://gitweb.torproject.org/tor.git/commit/55f635745afacefffdaafc72cc176ca7ab817546" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://gitweb.torproject.org/tor.git/commit/57e35ad3d91724882c345ac709666a551a977f0f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://trac.torproject.org/projects/tor/ticket/6530" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10_alpha | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.1.1 | |
tor | tor | 0.2.1.1.2 | |
tor | tor | 0.2.1.1.3 | |
tor | tor | 0.2.1.1.4 | |
tor | tor | 0.2.1.1.5 | |
tor | tor | 0.2.1.1.6 | |
tor | tor | 0.2.1.1.7 | |
tor | tor | 0.2.1.1.8 | |
tor | tor | 0.2.1.1.9 | |
tor | tor | 0.2.1.1.10 | |
tor | tor | 0.2.1.1.11 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.1.1.22 | |
tor | tor | 0.2.1.1.23 | |
tor | tor | 0.2.1.1.24 | |
tor | tor | 0.2.1.1.25 | |
tor | tor | 0.2.1.1.26 | |
tor | tor | 0.2.1.1.27 | |
tor | tor | 0.2.1.1.28 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.1.28 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "7983C11D-5B1E-46FA-9ABF-ABAE995B11BE", "versionEndIncluding": "0.2.1.29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "E149062A-F48E-4E99-8A3C-B32FFC922695", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "67AF751E-3C14-4B67-9E24-DBD14E00D72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "02525A8C-2384-409C-8D94-13D8E30904EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "04955D07-0755-473C-AD6A-1AC5B158E387", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "810D53DA-CACC-4432-B8E5-C42464B316C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "334049F0-332B-4736-B0C9-45B0C1289F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "9F8D1841-FDBB-4507-B092-F41C49285B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "02937401-0114-4D9C-9FDE-E299CC55FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "59C66307-DB75-40C2-8AB6-538C9E35E141", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "1BBF6A17-43CC-4E14-AC2F-DC6C46B98A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "E511EB2D-7E75-45BC-B446-4CD0FFB7016E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC7FC78-6BD8-427E-937D-BD6B4ED7FADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "0B9D629C-8D14-490B-A7FA-E765F51226EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "EB0956E0-5A7F-4DA5-8F71-2226EDE9A9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "54AE55C4-F3C2-403A-B581-A7E174F6FC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "D5ABB714-CF7E-44F5-BB4F-C428CB3D14FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "25C41E2D-3C63-4F83-8EF0-99DDA656C276", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "5EF7556A-8845-4515-A760-024552EDACD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "DB6D57D7-E9C7-47D6-AC84-09960BC07723", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "B081491D-3080-4EDA-9A48-64CF13DE0F81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "142C73E5-B6A1-4D12-832D-01CF3BB5DC8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the policy_summarize function in or/policies.c in Tor before 0.2.1.30 allows remote attackers to cause a denial of service (directory authority crash) via a crafted policy that triggers creation of a long port list." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en la funci\u00f3n policy_summarize en or/policies.c en Tor antes de v0.2.1.30 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la autoridad de directorio) a trav\u00e9s de una pol\u00edtica manipulada que provoca la creaci\u00f3n de una lista de puertos largos." } ], "id": "CVE-2011-1924", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-06-14T17:55:05.313", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061258.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43548" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44862" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/46618" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705192" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705194" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/commit/43414eb98821d3b5c6c65181d7545ce938f82c8e" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061258.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43548" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44862" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46618" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705192" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705194" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/commit/43414eb98821d3b5c6c65181d7545ce938f82c8e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10_alpha | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, when functioning as a bridge directory authority, allows remote attackers to obtain sensitive information about bridge identities and bridge descriptors via a dbg-stability.txt directory query." }, { "lang": "es", "value": "Tor anterior a v0.2.1.22, y 0.2.2.x anteriores a v0.2.2.7-alpha, cuando funciona como autoridad de directorio puente, permite a atacantes remotos obtener informaci\u00f3n sensible acerca de las identidades y descriptores puente a trav\u00e9s de una consulta al directorio dbg-stability.txt." } ], "id": "CVE-2010-0385", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-01-25T19:30:01.697", "references": [ { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/announce/Jan-2010/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38198" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/61865" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/37901" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/announce/Jan-2010/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/61865" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/37901" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The privoxy configuration file in Tor before 0.1.1.20, when run on Apple OS X, logs all data via the \"logfile\", which allows attackers to obtain potentially sensitive information." }, { "lang": "es", "value": "El archivo de configuraci\u00f3n en Tor antes de la versi\u00f3n 0.1.1.20, cuando se ejecuta en Apple OS X, almacena todos los archivos de log a trav\u00e9s del \"logfile\", lo que permite a atacantes remotos obtener informaci\u00f3n potencialmente sensible." } ], "id": "CVE-2006-3413", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25875" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10_alpha | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB84ADB5-01EA-4ECF-B36E-9CE54E8309C0", "versionEndIncluding": "0.1.2.31", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.0.32 does not properly process the (1) User and (2) Group configuration options, which might allow local users to gain privileges by leveraging unintended supplementary group memberships of the Tor process." }, { "lang": "es", "value": "Tor anterior a v0.2.32 no procesa adecuadamente la configuraci\u00f3n de las opciones de (1)usuario (User) y (2) Grupo (group), lo que permitir\u00eda a usuarios locales obtener privilegios aprovechando la pertenencia a grupos creados por defecto en los procesos de Tor." } ], "id": "CVE-2008-5397", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-12-09T00:30:00.567", "references": [ { "source": "cve@mitre.org", "url": "http://blog.torproject.org/blog/tor-0.2.0.32-released" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33025" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34583" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/32648" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/3366" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://blog.torproject.org/blog/tor-0.2.0.32-released" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/32648" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/3366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47101" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }