Lucene search

K
cve[email protected]CVE-2008-5398
HistoryDec 09, 2008 - 12:30 a.m.

CVE-2008-5398

2008-12-0900:30:00
CWE-264
web.nvd.nist.gov
25
cve-2008-5398
tor vulnerability
dns
exit relay
ip address mapping
security issue

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

6.3 Medium

AI Score

Confidence

Low

0.006 Low

EPSS

Percentile

79.5%

Tor before 0.2.0.32 does not properly process the ClientDNSRejectInternalAddresses configuration option in situations where an exit relay issues a policy-based refusal of a stream, which allows remote exit relays to have an unknown impact by mapping an internal IP address to the destination hostname of a refused stream.

Affected configurations

NVD
Node
tortorRange0.1.2.31
OR
tortorMatch0.0.2
OR
tortorMatch0.0.2_pre13
OR
tortorMatch0.0.2_pre14
OR
tortorMatch0.0.2_pre15
OR
tortorMatch0.0.2_pre16
OR
tortorMatch0.0.2_pre17
OR
tortorMatch0.0.2_pre18
OR
tortorMatch0.0.2_pre19
OR
tortorMatch0.0.2_pre20
OR
tortorMatch0.0.2_pre21
OR
tortorMatch0.0.2_pre22
OR
tortorMatch0.0.2_pre23
OR
tortorMatch0.0.2_pre24
OR
tortorMatch0.0.2_pre25
OR
tortorMatch0.0.2_pre26
OR
tortorMatch0.0.2_pre27
OR
tortorMatch0.0.3
OR
tortorMatch0.0.4
OR
tortorMatch0.0.5
OR
tortorMatch0.0.6
OR
tortorMatch0.0.6.1
OR
tortorMatch0.0.6.2
OR
tortorMatch0.0.7
OR
tortorMatch0.0.7.1
OR
tortorMatch0.0.7.2
OR
tortorMatch0.0.7.3
OR
tortorMatch0.0.8
OR
tortorMatch0.0.8.1
OR
tortorMatch0.0.9
OR
tortorMatch0.0.9.1
OR
tortorMatch0.0.9.2
OR
tortorMatch0.0.9.3
OR
tortorMatch0.0.9.4
OR
tortorMatch0.0.9.5
OR
tortorMatch0.0.9.6
OR
tortorMatch0.0.9.7
OR
tortorMatch0.0.9.8
OR
tortorMatch0.0.9.9
OR
tortorMatch0.0.9.10
OR
tortorMatch0.1.0.1
OR
tortorMatch0.1.0.2
OR
tortorMatch0.1.0.3
OR
tortorMatch0.1.0.4
OR
tortorMatch0.1.0.5
OR
tortorMatch0.1.0.6
OR
tortorMatch0.1.0.7
OR
tortorMatch0.1.0.8
OR
tortorMatch0.1.0.9
OR
tortorMatch0.1.0.10
OR
tortorMatch0.1.0.11
OR
tortorMatch0.1.0.12
OR
tortorMatch0.1.0.13
OR
tortorMatch0.1.0.14
OR
tortorMatch0.1.0.15
OR
tortorMatch0.1.0.16
OR
tortorMatch0.1.0.17
OR
tortorMatch0.1.0.18
OR
tortorMatch0.1.0.19
OR
tortorMatch0.1.1.1
OR
tortorMatch0.1.1.1_alpha
OR
tortorMatch0.1.1.2
OR
tortorMatch0.1.1.2_alpha
OR
tortorMatch0.1.1.3
OR
tortorMatch0.1.1.3_alpha
OR
tortorMatch0.1.1.4
OR
tortorMatch0.1.1.4_alpha
OR
tortorMatch0.1.1.5
OR
tortorMatch0.1.1.5_alpha
OR
tortorMatch0.1.1.6
OR
tortorMatch0.1.1.6_alpha
OR
tortorMatch0.1.1.7
OR
tortorMatch0.1.1.7_alpha
OR
tortorMatch0.1.1.8
OR
tortorMatch0.1.1.8_alpha
OR
tortorMatch0.1.1.9
OR
tortorMatch0.1.1.9_alpha
OR
tortorMatch0.1.1.10
OR
tortorMatch0.1.1.10_alpha
OR
tortorMatch0.1.1.11
OR
tortorMatch0.1.1.12
OR
tortorMatch0.1.1.13
OR
tortorMatch0.1.1.14
OR
tortorMatch0.1.1.15
OR
tortorMatch0.1.1.16
OR
tortorMatch0.1.1.17
OR
tortorMatch0.1.1.18
OR
tortorMatch0.1.1.19
OR
tortorMatch0.1.1.20
OR
tortorMatch0.1.1.21
OR
tortorMatch0.1.1.22
OR
tortorMatch0.1.1.23
OR
tortorMatch0.1.1.26
OR
tortorMatch0.1.2.1_alpha-cvs
OR
tortorMatch0.1.2.14
OR
tortorMatch0.1.2.15
OR
tortorMatch0.1.2.17
OR
tortorMatch0.1.2.18
OR
tortorMatch0.1.2.19
OR
tortorMatch0.1.2.30

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

6.3 Medium

AI Score

Confidence

Low

0.006 Low

EPSS

Percentile

79.5%