Lucene search

K
cve[email protected]CVE-2009-2426
HistoryJul 10, 2009 - 5:30 p.m.

CVE-2009-2426

2009-07-1017:30:00
web.nvd.nist.gov
26
cve-2009-2426
tor
dns
security vulnerability
unspecified impact
exit relays
nvd

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

6.5 Medium

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

73.6%

The connection_edge_process_relay_cell_not_open function in src/or/relay.c in Tor 0.2.x before 0.2.0.35 and 0.1.x before 0.1.2.8-beta allows exit relays to have an unspecified impact by causing controllers to accept DNS responses that redirect to an internal IP address via unknown vectors. NOTE: some of these details are obtained from third party information.

Affected configurations

NVD
Node
tortorMatch0.1.0.1
OR
tortorMatch0.1.0.2
OR
tortorMatch0.1.0.3
OR
tortorMatch0.1.0.4
OR
tortorMatch0.1.0.5
OR
tortorMatch0.1.0.6
OR
tortorMatch0.1.0.7
OR
tortorMatch0.1.0.8
OR
tortorMatch0.1.0.9
OR
tortorMatch0.1.0.10
OR
tortorMatch0.1.0.11
OR
tortorMatch0.1.0.12
OR
tortorMatch0.1.0.13
OR
tortorMatch0.1.0.14
OR
tortorMatch0.1.0.15
OR
tortorMatch0.1.0.16
OR
tortorMatch0.1.0.17
OR
tortorMatch0.1.0.18
OR
tortorMatch0.1.0.19
OR
tortorMatch0.1.1
OR
tortorMatch0.1.1.1
OR
tortorMatch0.1.1.1_alpha
OR
tortorMatch0.1.1.2
OR
tortorMatch0.1.1.2_alpha
OR
tortorMatch0.1.1.3
OR
tortorMatch0.1.1.3_alpha
OR
tortorMatch0.1.1.4
OR
tortorMatch0.1.1.4_alpha
OR
tortorMatch0.1.1.5
OR
tortorMatch0.1.1.5_alpha
OR
tortorMatch0.1.1.6
OR
tortorMatch0.1.1.6_alpha
OR
tortorMatch0.1.1.7
OR
tortorMatch0.1.1.7_alpha
OR
tortorMatch0.1.1.8
OR
tortorMatch0.1.1.8_alpha
OR
tortorMatch0.1.1.9
OR
tortorMatch0.1.1.9_alpha
OR
tortorMatch0.1.1.10
OR
tortorMatch0.1.1.10_alpha
OR
tortorMatch0.1.1.11
OR
tortorMatch0.1.1.12
OR
tortorMatch0.1.1.13
OR
tortorMatch0.1.1.14
OR
tortorMatch0.1.1.15
OR
tortorMatch0.1.1.16
OR
tortorMatch0.1.1.17
OR
tortorMatch0.1.1.18
OR
tortorMatch0.1.1.19
OR
tortorMatch0.1.1.20
OR
tortorMatch0.1.1.21
OR
tortorMatch0.1.1.22
OR
tortorMatch0.1.1.23
OR
tortorMatch0.1.1.25
OR
tortorMatch0.1.1.26
OR
tortorMatch0.1.2.1_alpha-cvs
OR
tortorMatch0.1.2.2
OR
tortorMatch0.1.2.3alpha
OR
tortorMatch0.1.2.4
OR
tortorMatch0.1.2.5
OR
tortorMatch0.1.2.5alpha
OR
tortorMatch0.1.2.6alpha
OR
tortorMatch0.1.2.7alpha
OR
tortorMatch0.2.0.1alpha
OR
tortorMatch0.2.0.2alpha
OR
tortorMatch0.2.0.3alpha
OR
tortorMatch0.2.0.4alpha
OR
tortorMatch0.2.0.5alpha
OR
tortorMatch0.2.0.6alpha
OR
tortorMatch0.2.0.7alpha
OR
tortorMatch0.2.0.8alpha
OR
tortorMatch0.2.0.9alpha
OR
tortorMatch0.2.0.10alpha
OR
tortorMatch0.2.0.11alpha
OR
tortorMatch0.2.0.12alpha
OR
tortorMatch0.2.0.13alpha
OR
tortorMatch0.2.0.14alpha
OR
tortorMatch0.2.0.15alpha
OR
tortorMatch0.2.0.16alpha
OR
tortorMatch0.2.0.17alpha
OR
tortorMatch0.2.0.18alpha
OR
tortorMatch0.2.0.19alpha
OR
tortorMatch0.2.0.20alpha
OR
tortorMatch0.2.0.21alpha
OR
tortorMatch0.2.0.22alpha
OR
tortorMatch0.2.0.23alpha
OR
tortorMatch0.2.0.24alpha
OR
tortorMatch0.2.0.25alpha
OR
tortorMatch0.2.0.26alpha
OR
tortorMatch0.2.0.27alpha
OR
tortorMatch0.2.0.28alpha
OR
tortorMatch0.2.0.29alpha
OR
tortorMatch0.2.0.31alpha
OR
tortorMatch0.2.0.33
OR
tortorMatch0.2.0.34alpha

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

6.5 Medium

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

73.6%