GHSA-47VR-CRPX-W72F
Vulnerability from github – Published: 2021-12-14 00:01 – Updated: 2021-12-17 00:01
VLAI?
Details
The Onion module in toxcore before 0.2.2 doesn't restrict which packets can be onion-routed, which allows a remote attacker to discover a target user's IP address (when knowing only their Tox Id) by positioning themselves close to target's Tox Id in the DHT for the target to establish an onion connection with the attacker, guessing the target's DHT public key and creating a DHT node with public key close to it, and finally onion-routing a NAT Ping Request to the target, requesting it to ping the just created DHT node.
{
"affected": [],
"aliases": [
"CVE-2018-25022"
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-12-13T01:15:00Z",
"severity": "MODERATE"
},
"details": "The Onion module in toxcore before 0.2.2 doesn\u0027t restrict which packets can be onion-routed, which allows a remote attacker to discover a target user\u0027s IP address (when knowing only their Tox Id) by positioning themselves close to target\u0027s Tox Id in the DHT for the target to establish an onion connection with the attacker, guessing the target\u0027s DHT public key and creating a DHT node with public key close to it, and finally onion-routing a NAT Ping Request to the target, requesting it to ping the just created DHT node.",
"id": "GHSA-47vr-crpx-w72f",
"modified": "2021-12-17T00:01:09Z",
"published": "2021-12-14T00:01:17Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-25022"
},
{
"type": "WEB",
"url": "https://github.com/TokTok/c-toxcore/issues/873"
},
{
"type": "WEB",
"url": "https://github.com/TokTok/c-toxcore/pull/872"
},
{
"type": "WEB",
"url": "https://blog.tox.chat/2018/04/security-vulnerability-and-new-toxcore-release"
}
],
"schema_version": "1.4.0",
"severity": []
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…