- EPSS 0.49%
- Veröffentlicht 07.07.2006 00:05:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Tor before 0.1.1.20 supports server descriptors that contain hostnames instead of IP addresses, which allows remote attackers to arbitrarily group users by providing preferential address resolution.
CVE-2006-3415
- EPSS 0.48%
- Veröffentlicht 07.07.2006 00:05:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Tor before 0.1.1.20 uses improper logic to validate the "OR" destination, which allows remote attackers to perform a man-in-the-middle (MITM) attack via unspecified vectors.
- EPSS 0.78%
- Veröffentlicht 07.07.2006 00:05:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Tor before 0.1.1.20 kills the circuit when it receives an unrecognized relay command, which causes network circuits to be disbanded. NOTE: while this item is listed under the "Security fixes" section of the developer changelog, the developer clarifi...
CVE-2006-3417
- EPSS 0.48%
- Veröffentlicht 07.07.2006 00:05:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Tor client before 0.1.1.20 prefers entry points based on is_fast or is_stable flags, which could allow remote attackers to be preferred over nodes that are identified as more trustworthy "entry guard" (is_guard) systems by directory authorities.
- EPSS 0.48%
- Veröffentlicht 07.07.2006 00:05:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Tor before 0.1.1.20 does not validate that a server descriptor's fingerprint line matches its identity key, which allows remote attackers to spoof the fingerprint line, which might be trusted by users or other applications.
- EPSS 1.15%
- Veröffentlicht 25.01.2006 11:03:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Tor before 0.1.1.20 allows remote attackers to identify hidden services via a malicious Tor server that attempts a large number of accesses of the hidden service, which eventually causes a circuit to be built through the malicious server.
- EPSS 0.41%
- Veröffentlicht 23.08.2005 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other s...
- EPSS 0.64%
- Veröffentlicht 28.06.2005 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Unknown vulnerability in Tor before 0.1.0.10 allows remote attackers to read arbitrary memory and possibly key information from the exit server's process space.