First published: Sun Jun 26 2005(Updated: )
Unknown vulnerability in Tor before 0.1.0.10 allows remote attackers to read arbitrary memory and possibly key information from the exit server's process space.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tor (The Onion Router) | =0.0.9 | |
Tor (The Onion Router) | =0.0.9.1 | |
Tor (The Onion Router) | =0.0.9.2 | |
Tor (The Onion Router) | =0.0.9.3 | |
Tor (The Onion Router) | =0.0.9.4 | |
Tor (The Onion Router) | =0.0.9.5 | |
Tor (The Onion Router) | =0.0.9.6 | |
Tor (The Onion Router) | =0.0.9.7 | |
Tor (The Onion Router) | =0.0.9.8 | |
Tor (The Onion Router) | =0.0.9.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2050 is classified as a high-severity vulnerability due to its potential for remote exploitation.
To fix CVE-2005-2050, upgrade to a version of Tor that is newer than 0.1.0.10.
CVE-2005-2050 affects Tor versions 0.0.9, 0.0.9.1, 0.0.9.2, 0.0.9.3, 0.0.9.4, 0.0.9.5, 0.0.9.6, 0.0.9.7, 0.0.9.8, and 0.0.9.9.
The impact of CVE-2005-2050 includes the ability for remote attackers to read arbitrary memory and possibly access sensitive key information.
While CVE-2005-2050 may not be a current concern for most users due to updates, it highlights the importance of running the latest versions of security software.