Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2006-6893
HistoryOct 03, 2022 - 4:21 p.m.

CVE-2006-6893

2022-10-0316:21:23
Debian Security Bug Tracker
security-tracker.debian.org
8
tor
ip address discovery
hidden service
vulnerability
cpu temperature
icmp timestamps
tcp sequence numbers
tcp timestamps
laws of physics
hardware limitations
cve-2006-6893
unix

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.012 Low

EPSS

Percentile

85.3%

Tor allows remote attackers to discover the IP address of a hidden service by accessing this service at a high rate, thereby changing the server’s CPU temperature and consequently changing the pattern of time values visible through (1) ICMP timestamps, (2) TCP sequence numbers, and (3) TCP timestamps, a different vulnerability than CVE-2006-0414. NOTE: it could be argued that this is a laws-of-physics vulnerability that is a fundamental design limitation of certain hardware implementations, so perhaps this issue should not be included in CVE.

OSVersionArchitecturePackageVersionFilename
Debian12alltor<= 0.4.7.16-1tor_0.4.7.16-1_all.deb
Debian11alltor<= 0.4.5.16-1tor_0.4.5.16-1_all.deb
Debian999alltor<= 0.4.8.12-1tor_0.4.8.12-1_all.deb
Debian13alltor<= 0.4.8.12-1tor_0.4.8.12-1_all.deb

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.012 Low

EPSS

Percentile

85.3%