4

CVE-2013-7295

Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
TorprojectTor Version <= 0.2.4.19
TorprojectTor Version0.2.4.1 Updatealpha
TorprojectTor Version0.2.4.2 Updatealpha
TorprojectTor Version0.2.4.3 Updatealpha
TorprojectTor Version0.2.4.4 Updatealpha
TorprojectTor Version0.2.4.5 Updatealpha
TorprojectTor Version0.2.4.6 Updatealpha
TorprojectTor Version0.2.4.7 Updatealpha
TorprojectTor Version0.2.4.8 Updatealpha
TorprojectTor Version0.2.4.9 Updatealpha
TorprojectTor Version0.2.4.10 Updatealpha
TorprojectTor Version0.2.4.11 Updatealpha
TorprojectTor Version0.2.4.12 Updatealpha
TorprojectTor Version0.2.4.13 Updatealpha
TorprojectTor Version0.2.4.14 Updatealpha
TorprojectTor Version0.2.4.15 Updaterc
TorprojectTor Version0.2.4.16 Updaterc
TorprojectTor Version0.2.4.17 Updaterc
TorprojectTor Version0.2.4.18 Updaterc
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.13% 0.297
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4 4.9 4.9
AV:N/AC:H/Au:N/C:P/I:P/A:N