First published: Sun Dec 31 2006(Updated: )
Tor allows remote attackers to discover the IP address of a hidden service by accessing this service at a high rate, thereby changing the server's CPU temperature and consequently changing the pattern of time values visible through (1) ICMP timestamps, (2) TCP sequence numbers, and (3) TCP timestamps, a different vulnerability than CVE-2006-0414. NOTE: it could be argued that this is a laws-of-physics vulnerability that is a fundamental design limitation of certain hardware implementations, so perhaps this issue should not be included in CVE.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tor (The Onion Router) | =0.1.1.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6893 is considered a medium severity vulnerability due to the potential exposure of hidden services' IP addresses.
To mitigate CVE-2006-6893, you should upgrade to a more recent version of the Tor software that addresses this vulnerability.
CVE-2006-6893 involves remote attacks that can discover hidden service IP addresses through high-rate access.
CVE-2006-6893 can potentially compromise the anonymity of hidden services by exposing their IP addresses.
CVE-2006-6893 specifically affects Tor version 0.1.1.26.