First published: Sat Jan 14 2023(Updated: )
The SafeSocks option in Tor before 0.4.7.13 has a logic error in which the unsafe SOCKS4 protocol can be used but not the safe SOCKS4a protocol, aka TROVE-2022-002.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Torproject Tor | <0.4.7.13 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
debian/tor | <=0.3.5.16-1 | 0.3.5.16-1+deb10u1 0.4.5.16-1 0.4.7.13-1 0.4.8.7-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23589 is a vulnerability in Tor before version 0.4.7.13 that allows the unsafe SOCKS4 protocol to be used but not the safe SOCKS4a protocol.
The severity of CVE-2023-23589 is medium with a CVSS score of 6.5.
Tor versions up to and excluding 0.4.7.13 on Torproject Tor, Debian Debian Linux 10.0 and 11.0, and Fedora 36 and 37 are affected.
To fix CVE-2023-23589, update Tor to version 0.4.7.13 or later.
More information about CVE-2023-23589 can be found in the Tor Project's GitLab repository.