First published: Tue Jun 29 2021(Updated: )
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Torproject Tor | <0.3.5.15 | |
Torproject Tor | >=0.4.0.0<0.4.4.9 | |
Torproject Tor | >=0.4.5.0<0.4.5.9 | |
Torproject Tor | >=0.4.6.0<0.4.6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-34548.
The severity of CVE-2021-34548 is high with a severity value of 7.5.
CVE-2021-34548 affects Tor versions up to 0.4.6.5, allowing an attacker to bypass access control for ending a stream by forging RELAY_END or RELAY_RESOLVED messages.
To fix CVE-2021-34548, users should upgrade to Tor version 0.4.6.5 or later.
More information about CVE-2021-34548 can be found at the following references: [1] [2] [3].