First published: Tue Jun 29 2021(Updated: )
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Torproject Tor | <0.3.5.15 | |
Torproject Tor | >=0.4.0.0<0.4.4.9 | |
Torproject Tor | >=0.4.5.0<0.4.5.9 | |
Torproject Tor | >=0.4.6.0<0.4.6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34549 is a vulnerability discovered in Tor before 0.4.6.5, which mishandles hashing for certain retrieval of circuit data, allowing an attacker to cause algorithm inefficiency.
CVE-2021-34549 has a severity rating of 7.5 (High).
CVE-2021-34549 affects Torproject Tor versions up to and including 0.4.6.5.
An attacker can exploit CVE-2021-34549 by triggering the use of an attacker-chosen circuit ID, leading to algorithm inefficiency.
To fix CVE-2021-34549, update Torproject Tor to version 0.4.6.6 or later.