Lucene search

K
freebsdFreeBSD5FDE5C30-0F4E-11DA-BC01-000E0C2E438A
HistoryAug 11, 2005 - 12:00 a.m.

tor -- diffie-hellman handshake flaw

2005-08-1100:00:00
vuxml.freebsd.org
14

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.004 Low

EPSS

Percentile

73.0%

A tor advisory reports

Tor clients can completely loose anonymity, confidentiality,
and data integrity if the first Tor server in their path is
malicious. Specifically, if the Tor client chooses a
malicious Tor server for her first hop in the circuit, that
server can learn all the keys she negotiates for the rest of
the circuit (or just spoof the whole circuit), and then read
and/or modify all her traffic over that circuit.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchtor< 0.1.0.14UNKNOWN

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.004 Low

EPSS

Percentile

73.0%

Related for 5FDE5C30-0F4E-11DA-BC01-000E0C2E438A