First published: Sun Aug 21 2005(Updated: )
Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tor Tor | =0.1.1.1_alpha | |
Tor Tor | =0.1.0.7 | |
Tor Tor | =0.0.9.8 | |
Tor Tor | =0.0.9.2 | |
Tor Tor | =0.1.0.10 | |
Tor Tor | =0.0.9 | |
Tor Tor | =0.1.0.8 | |
Tor Tor | =0.0.9.5 | |
Tor Tor | =0.1.0.12 | |
Tor Tor | =0.0.9.3 | |
Tor Tor | =0.0.9.9 | |
Tor Tor | =0.1.1.3_alpha | |
Tor Tor | =0.1.0.5 | |
Tor Tor | =0.1.0.2 | |
Tor Tor | =0.1.0.1 | |
Tor Tor | =0.1.0.13 | |
Tor Tor | =0.1.0.3 | |
Tor Tor | =0.0.9.4 | |
Tor Tor | =0.1.1.4_alpha | |
Tor Tor | =0.1.0.6 | |
Tor Tor | =0.1.0.9 | |
Tor Tor | =0.1.1.2_alpha | |
Tor Tor | =0.0.9.1 | |
Tor Tor | =0.0.9.7 | |
Tor Tor | =0.1.0.4 | |
Tor Tor | =0.0.9.6 | |
Tor Tor | =0.1.0.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.