Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit.
References
Link | Resource |
---|---|
http://archives.seul.org/or/announce/Aug-2005/msg00002.html | Vendor Advisory |
http://marc.info/?l=bugtraq&m=112448002732443&w=2 | |
http://secunia.com/advisories/16424 | Patch Vendor Advisory |
http://securitytracker.com/id?1014739 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2005-08-21T04:00:00
Updated: 2016-10-17T13:57:01
Reserved: 2005-08-21T00:00:00
Link: CVE-2005-2643
JSON object: View
NVD Information
Status : Modified
Published: 2005-08-23T04:00:00.000
Modified: 2016-10-18T03:29:18.277
Link: CVE-2005-2643
JSON object: View
Redhat Information
No data.
CWE