First published: Sun Dec 03 2017(Updated: )
In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, the replay-cache protection mechanism is ineffective for v2 onion services, aka TROVE-2017-009. An attacker can send many INTRODUCE2 cells to trigger this issue.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tor | 0.3.5.16-1 0.3.5.16-1+deb10u1 0.4.5.16-1 0.4.7.13-1 0.4.8.7-1 | |
Tor Browser | <0.2.5.16 | |
Tor Browser | >=0.2.6<0.2.8.17 | |
Tor Browser | >=0.2.9<0.2.9.14 | |
Tor Browser | >=0.3.0<0.3.0.13 | |
Tor Browser | >=0.3.1<0.3.1.9 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8819 has a moderate severity rating, allowing attackers to bypass replay-cache protection for v2 onion services.
To fix CVE-2017-8819, upgrade to Tor version 0.3.5.16-1 or later, or any of the specified secure versions listed in the advisory.
CVE-2017-8819 affects Tor versions before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9.
Attackers can exploit CVE-2017-8819 by flooding the system with INTRODUCE2 cells, compromising the security of v2 onion services.
Yes, patches for CVE-2017-8819 are available in the updated versions of Tor specified in the vulnerability details.