Tor

Tor

58 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.48%
  • Veröffentlicht 31.12.2006 05:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Tor allows remote attackers to discover the IP address of a hidden service by accessing this service at a high rate, thereby changing the server's CPU temperature and consequently changing the pattern of time values visible through (1) ICMP timestamp...

  • EPSS 1.35%
  • Veröffentlicht 31.08.2006 23:04:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Unspecified vulnerability in (1) Tor 0.1.0.x before 0.1.0.18 and 0.1.1.x before 0.1.1.23, and (2) ScatterChat before 1.0.2, allows remote attackers operating a Tor entry node to route arbitrary Tor traffic through clients or cause a denial of service...

  • EPSS 0.33%
  • Veröffentlicht 07.07.2006 00:05:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct bru...

  • EPSS 0.76%
  • Veröffentlicht 07.07.2006 00:05:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Tor before 0.1.1.20 allows remote attackers to spoof log entries or possibly execute shell code via strings with non-printable characters.

  • EPSS 1.27%
  • Veröffentlicht 07.07.2006 00:05:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Unspecified vulnerability in the directory server (dirserver) in Tor before 0.1.1.20 allows remote attackers to cause an unspecified denial of service via unknown vectors.

  • EPSS 5.42%
  • Veröffentlicht 07.07.2006 00:05:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Integer overflow in Tor before 0.1.1.20 allows remote attackers to execute arbitrary code via crafted large inputs, which result in a buffer overflow when elements are added to smartlists.

  • EPSS 0.65%
  • Veröffentlicht 07.07.2006 00:05:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Tor before 0.1.1.20 creates "internal circuits" primarily consisting of nodes with "useful exit nodes," which allows remote attackers to conduct unspecified statistical attacks.

  • EPSS 0.26%
  • Veröffentlicht 07.07.2006 00:05:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys.

  • EPSS 0.35%
  • Veröffentlicht 07.07.2006 00:05:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Tor before 0.1.1.20 does not sufficiently obey certain firewall options, which allows remote attackers to bypass intended access restrictions for dirservers, direct connections, or proxy servers.

  • EPSS 0.37%
  • Veröffentlicht 07.07.2006 00:05:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The privoxy configuration file in Tor before 0.1.1.20, when run on Apple OS X, logs all data via the "logfile", which allows attackers to obtain potentially sensitive information.