CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
85.3%
Tor before 0.1.1.20 allows remote attackers to identify hidden services via a malicious Tor server that attempts a large number of accesses of the hidden service, which eventually causes a circuit to be built through the malicious server.
Vendor | Product | Version | CPE |
---|---|---|---|
tor | tor | 0.0.2 | cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre13 | cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre14 | cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre15 | cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre16 | cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre17 | cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre18 | cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre19 | cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre20 | cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre21 | cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:* |
archives.seul.org/or/announce/Jan-2006/msg00001.html
secunia.com/advisories/18576
secunia.com/advisories/20514
security.gentoo.org/glsa/glsa-200606-04.xml
tor.eff.org/cvs/tor/ChangeLog
www.osvdb.org/22689
www.securityfocus.com/bid/18323
www.securityfocus.com/bid/19795
exchange.xforce.ibmcloud.com/vulnerabilities/24285