4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:H/Au:N/C:P/I:P/A:N
0.002 Low
EPSS
Percentile
55.5%
Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | tor | < 0.2.4.20-1 | tor_0.2.4.20-1_all.deb |
Debian | 11 | all | tor | < 0.2.4.20-1 | tor_0.2.4.20-1_all.deb |
Debian | 999 | all | tor | < 0.2.4.20-1 | tor_0.2.4.20-1_all.deb |
Debian | 13 | all | tor | < 0.2.4.20-1 | tor_0.2.4.20-1_all.deb |