Search criteria

111 vulnerabilities found for tor by torproject

VAR-201402-0034

Vulnerability from variot - Updated: 2023-12-18 13:53

Tor before 0.2.3.24-rc allows remote attackers to cause a denial of service (assertion failure and daemon exit) by performing link protocol negotiation incorrectly. Tor (The Onion Router) is an implementation of the second generation of onion routing, mainly used for anonymous access to the Internet. The application is prone to a remote denial-of-service vulnerability. Attackers may exploit this issue to cause an affected application to crash, resulting in a denial-of-service condition. Versions prior to Tor 0.2.4.4-alpha are vulnerable

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201402-0034",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.1.20"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.9.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.9.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.38"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.37"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.36"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.35"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.34"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.33"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.32"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.31"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.30"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.29"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.28"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.27"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.26"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.23"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.22"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.21"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.20"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.19"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.0.30"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.2.19"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.2.18"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.2.17"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.2.16"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.2.15"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.2.14"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.2.13"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.1.26"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.1.25"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.1.24"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.1.23"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.1.22"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.1.21"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.0.17"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.0.16"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.0.15"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.0.14"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.0.13"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.0.12"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.0.11"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.0.10"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.9.9"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.9.8"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.9.7"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.9.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.9.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.9.4"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.9.10"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.9.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.8.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.7.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.7.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.7.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.7"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.6.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.6.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.4"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.33"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.34"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.24"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.25"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.18"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.15"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.21"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.14"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.20"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.31"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.22"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.35"
      },
      {
        "model": "tor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.23"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.32"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.17"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.19"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.16"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.18"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.13"
      },
      {
        "model": "tor",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "the tor",
        "version": "0.2.3.24-rc"
      },
      {
        "model": "tor \u003c0.2.3.24-rc",
        "scope": null,
        "trust": 0.6,
        "vendor": "torproject",
        "version": null
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "torproject",
        "version": "0.2.3.23"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.225"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.224"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.35"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.34"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.33"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.32"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.31"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.4.19"
      },
      {
        "model": "tor rc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.23"
      },
      {
        "model": "tor rc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.22"
      },
      {
        "model": "tor rc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.21"
      },
      {
        "model": "tor rc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.20"
      },
      {
        "model": "tor rc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.19"
      },
      {
        "model": "tor rc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.18"
      },
      {
        "model": "tor beta",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.17"
      },
      {
        "model": "tor alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.16"
      },
      {
        "model": "tor alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.15"
      },
      {
        "model": "tor alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.14"
      },
      {
        "model": "tor alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.13"
      },
      {
        "model": "tor pre27",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre26",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre25",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre24",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre23",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre22",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre21",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre20",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre19",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre18",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre17",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre16",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre15",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre14",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre13",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor alpha",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.4.4"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00703"
      },
      {
        "db": "BID",
        "id": "65356"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006130"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2250"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-016"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.33:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.35:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.29:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre14:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:*:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "0.2.3.23",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.35:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.32:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre17:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.23:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.24:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.37:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.14:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.13:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.6.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.14:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.7.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre26:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.24:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.6.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.28:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.23:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.20:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.27:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.38:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre24:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.21:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre21:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.18:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.34:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.7.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre19:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre13:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.7.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre23:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.25:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.32:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.16:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre16:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.14:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.36:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.34:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.15:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre27:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.26:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre20:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.25:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre25:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.33:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.22:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre15:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.17:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.26:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre22:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.19:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre18:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-2250"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "65356"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2012-2250",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2012-2250",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2014-00703",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2012-2250",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-00703",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201402-016",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00703"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006130"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2250"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-016"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Tor before 0.2.3.24-rc allows remote attackers to cause a denial of service (assertion failure and daemon exit) by performing link protocol negotiation incorrectly. Tor (The Onion Router) is an implementation of the second generation of onion routing, mainly used for anonymous access to the Internet. The application is prone to a remote denial-of-service vulnerability. \nAttackers may exploit this issue to cause an affected application to crash, resulting in a denial-of-service condition. \nVersions prior to Tor 0.2.4.4-alpha are vulnerable",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-2250"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006130"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00703"
      },
      {
        "db": "BID",
        "id": "65356"
      }
    ],
    "trust": 2.43
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-2250",
        "trust": 3.3
      },
      {
        "db": "BID",
        "id": "65356",
        "trust": 0.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006130",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00703",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-016",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00703"
      },
      {
        "db": "BID",
        "id": "65356"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006130"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2250"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-016"
      }
    ]
  },
  "id": "VAR-201402-0034",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00703"
      }
    ],
    "trust": 0.06
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00703"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:53:24.164000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Bug 1060768",
        "trust": 0.8,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060768"
      },
      {
        "title": "ChangeLog",
        "trust": 0.8,
        "url": "https://gitweb.torproject.org/tor.git?a=blob_plain;hb=head;f=changelog"
      },
      {
        "title": "Patch for Tor Remote Denial of Service Vulnerability (CNVD-2014-00703)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/43275"
      },
      {
        "title": "tor-0.2.3.24-rc",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=47816"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00703"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006130"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-016"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-2250"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.5,
        "url": "https://gitweb.torproject.org/tor.git?a=blob_plain;hb=head;f=changelog"
      },
      {
        "trust": 1.0,
        "url": "https://gitweb.torproject.org/tor.git?a=blob_plain%3bhb=head%3bf=changelog"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2250"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2250"
      },
      {
        "trust": 0.8,
        "url": "http://debian.2.n7.nabble.com/bug-691499-unblock-tor-0-2-3-24-rc-1-td2788119.html"
      },
      {
        "trust": 0.3,
        "url": "https://www.torproject.org/index.html.en"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00703"
      },
      {
        "db": "BID",
        "id": "65356"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006130"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2250"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-016"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00703"
      },
      {
        "db": "BID",
        "id": "65356"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006130"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2250"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-016"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-02-11T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-00703"
      },
      {
        "date": "2012-10-25T00:00:00",
        "db": "BID",
        "id": "65356"
      },
      {
        "date": "2014-02-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-006130"
      },
      {
        "date": "2014-02-03T03:55:03.660000",
        "db": "NVD",
        "id": "CVE-2012-2250"
      },
      {
        "date": "2014-02-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201402-016"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-02-11T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-00703"
      },
      {
        "date": "2012-10-25T00:00:00",
        "db": "BID",
        "id": "65356"
      },
      {
        "date": "2014-02-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-006130"
      },
      {
        "date": "2023-11-07T02:10:26.173000",
        "db": "NVD",
        "id": "CVE-2012-2250"
      },
      {
        "date": "2014-02-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201402-016"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-016"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Tor Service disruption in  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006130"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-016"
      }
    ],
    "trust": 0.6
  }
}

VAR-201709-0618

Vulnerability from variot - Updated: 2023-12-18 13:29

The rend_service_intro_established function in or/rendservice.c in Tor before 0.2.8.15, 0.2.9.x before 0.2.9.12, 0.3.0.x before 0.3.0.11, 0.3.1.x before 0.3.1.7, and 0.3.2.x before 0.3.2.1-alpha, when SafeLogging is disabled, allows attackers to obtain sensitive information by leveraging access to the log files of a hidden service, because uninitialized stack data is included in an error message about construction of an introduction point circuit. Tor Contains a vulnerability related to information disclosure from log files.Information may be obtained. Tor is an implementation of the second generation of onion routing, which is mainly used to access the Internet anonymously. Tor is prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512


Debian Security Advisory DSA-3993-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff October 06, 2017 https://www.debian.org/security/faq


Package : tor CVE ID : CVE-2017-0380

It was discovered that the Tor onion service could leak sensitive information to log files if the "SafeLogging" option is set to "0".

The oldstable distribution (jessie) is not affected.

For the stable distribution (stretch), this problem has been fixed in version 0.2.9.12-1.

We recommend that you upgrade your tor packages.

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlnX+bUACgkQEMKTtsN8 Tjb5ehAAnG7JAqEQtjrUAenUy9wZtmsqA5AtFf6goHCw9uYZ0Co2rAZbRQYKeerw z9TtW/gyKZdYSmY2jd82E9rJTHfuNX7J37LIfNqb8CMLf+eW5shnqghPX+R+MfXU q99ufaKpdDrK8ZRg3ECXpvHXLyzgYvlm8KAX/6bnv0Kt6nNvE3LCDSXvDjGcGuX/ VEnfZMk6GnxlIp/op3uXPYQYKm7BrModTMx7iKoTlBwhdlxh8MwTBsrEH+aQvIUo ZCqqOdU31Av6OngBmIwnkFPq/4FjXvS/lkmpXP6y6g7RCIAc8yf72wk0lNR5OqBX 2svQyr5ZqBH3fCM9eSDUV4nBvC8xUEETZQpMZRUqlF/SJcO33Jh+R+UE3HHh1Imy ozoxnx+qiKUWoUuSXnPCetXKaWH3alJXkp2JDsmoSAVwW/VBeGylsuQ2nAeYTcOb fdpXRqrL+w/w7VXCIAJ3bCN5N8j6otRtMUAntHgXfqxx72Zk5MQrco7aiPvLzten VyKYFxQiRcBV/JFR37Unklkgf4TNxwXhgVe8M6AiVvyyRcH0v8zEKn7HX53h+fSM W27BweGIE9qpOQlo1m8XiQml/3J8aJhAbvuwRoIoiwKb9Xos6+YdxCqDOJiFArk3 ozt2+7pKmawWD3dJotVIu8tOMOC8lYdP5H0YLy6Qt3X3+zm1x3g= =7kef -----END PGP SIGNATURE-----

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201709-0618",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "torproject",
        "version": "0.3.1.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "torproject",
        "version": "0.3.0.10"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.3.0.8"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.3.0.9"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.3.1.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.3.1.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.3.1.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.3.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.3.1.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.3.1.4"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.3.0.0"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.9.11"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.9.0"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.9.10"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.3.0.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.9.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.3.0.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.3.0.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.9.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.9.9"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.9.8"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.3.0.4"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.9.4"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.9.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.3.0.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.3.0.7"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.3.0.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.9.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.9.1"
      },
      {
        "model": "tor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.8.14"
      },
      {
        "model": "tor",
        "scope": null,
        "trust": 0.8,
        "vendor": "the tor",
        "version": null
      },
      {
        "model": "tor",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "tor",
        "version": "0.2.8.15"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "tor",
        "version": "0.2.9.*,\u003c0.2.9.12"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "tor",
        "version": "0.3.0.*,\u003c0.3.0.11"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "tor",
        "version": "0.3.1.*,\u003c0.3.1.7"
      },
      {
        "model": "0.3.2.*,\u003c0.3.2.1-alpha",
        "scope": null,
        "trust": 0.6,
        "vendor": "tor",
        "version": null
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.3.1.0"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.8.14"
      },
      {
        "model": "linux sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux s/390",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux powerpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux mips",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux ia-64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux ia-32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux arm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "tor 0.3.2.1-alpha",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "torproject",
        "version": null
      },
      {
        "model": "tor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.3.1.7"
      },
      {
        "model": "tor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.3.0.11"
      },
      {
        "model": "tor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.9.12"
      },
      {
        "model": "tor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.8.15"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34623"
      },
      {
        "db": "BID",
        "id": "101222"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008306"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-0380"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-858"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.3.1.2:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.3.1.3:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.3.0.5:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.3.0.4:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.9.0:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.9.1:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.9.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.9.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.3.1.4:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.3.1.5:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.3.0.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.3.0.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.9.2:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.9.3:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.9.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "0.2.8.14",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.3.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.3.1.1:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.3.0.2:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.3.0.1:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.3.0.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.9.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.9.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.9.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.3.1.6:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.3.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.3.0.3:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.3.0.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.3.0.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.9.4:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.9.5:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-0380"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "101222"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2017-0380",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.3,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2017-0380",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2017-34623",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.2,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.9,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2017-0380",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2017-0380",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-34623",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201709-858",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34623"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008306"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-0380"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-858"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The rend_service_intro_established function in or/rendservice.c in Tor before 0.2.8.15, 0.2.9.x before 0.2.9.12, 0.3.0.x before 0.3.0.11, 0.3.1.x before 0.3.1.7, and 0.3.2.x before 0.3.2.1-alpha, when SafeLogging is disabled, allows attackers to obtain sensitive information by leveraging access to the log files of a hidden service, because uninitialized stack data is included in an error message about construction of an introduction point circuit. Tor Contains a vulnerability related to information disclosure from log files.Information may be obtained. Tor is an implementation of the second generation of onion routing, which is mainly used to access the Internet anonymously. Tor is prone to an information-disclosure vulnerability. \nAttackers can exploit this issue to obtain sensitive information that may aid in launching further attacks. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3993-1                   security@debian.org\nhttps://www.debian.org/security/                       Moritz Muehlenhoff\nOctober 06, 2017                      https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage        : tor\nCVE ID         : CVE-2017-0380\n\nIt was discovered that the Tor onion service could leak sensitive\ninformation to log files if the \"SafeLogging\" option is set to \"0\". \n\nThe oldstable distribution (jessie) is not affected. \n\nFor the stable distribution (stretch), this problem has been fixed in\nversion 0.2.9.12-1. \n\nWe recommend that you upgrade your tor packages. \n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\nozt2+7pKmawWD3dJotVIu8tOMOC8lYdP5H0YLy6Qt3X3+zm1x3g=\n=7kef\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-0380"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008306"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-34623"
      },
      {
        "db": "BID",
        "id": "101222"
      },
      {
        "db": "PACKETSTORM",
        "id": "144540"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-0380",
        "trust": 3.4
      },
      {
        "db": "SECTRACK",
        "id": "1039519",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008306",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-34623",
        "trust": 0.6
      },
      {
        "db": "NSFOCUS",
        "id": "37666",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-858",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "101222",
        "trust": 0.3
      },
      {
        "db": "PACKETSTORM",
        "id": "144540",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34623"
      },
      {
        "db": "BID",
        "id": "101222"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008306"
      },
      {
        "db": "PACKETSTORM",
        "id": "144540"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-0380"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-858"
      }
    ]
  },
  "id": "VAR-201709-0618",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34623"
      }
    ],
    "trust": 1.6
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "IoT"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34623"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:29:10.261000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Fix log-uninitialized-stack bug in rend_service_intro_established.",
        "trust": 0.8,
        "url": "https://github.com/torproject/tor/commit/09ea89764a4d3a907808ed7d4fe42abfe64bd486"
      },
      {
        "title": "Fix TROVE-2017-008: Stack disclosure in hidden services logs when SafeLogging disabled",
        "trust": 0.8,
        "url": "https://trac.torproject.org/projects/tor/ticket/23490"
      },
      {
        "title": "Patch for Tor \u0027rend_service_intro_established\u0027 function sensitive information disclosure vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/106424"
      },
      {
        "title": "Tor Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=74964"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34623"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008306"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-858"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-532",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008306"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-0380"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.9,
        "url": "https://github.com/torproject/tor/commit/09ea89764a4d3a907808ed7d4fe42abfe64bd486"
      },
      {
        "trust": 1.9,
        "url": "https://trac.torproject.org/projects/tor/ticket/23490"
      },
      {
        "trust": 1.0,
        "url": "http://www.debian.org/security/2017/dsa-3993"
      },
      {
        "trust": 1.0,
        "url": "http://www.securitytracker.com/id/1039519"
      },
      {
        "trust": 0.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-0380"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-0380"
      },
      {
        "trust": 0.6,
        "url": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-0380"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/37666"
      },
      {
        "trust": 0.3,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493513"
      },
      {
        "trust": 0.3,
        "url": "https://www.torproject.org/index.html.en"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/faq"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34623"
      },
      {
        "db": "BID",
        "id": "101222"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008306"
      },
      {
        "db": "PACKETSTORM",
        "id": "144540"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-0380"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-858"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34623"
      },
      {
        "db": "BID",
        "id": "101222"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008306"
      },
      {
        "db": "PACKETSTORM",
        "id": "144540"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-0380"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-858"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-20T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-34623"
      },
      {
        "date": "2017-09-18T00:00:00",
        "db": "BID",
        "id": "101222"
      },
      {
        "date": "2017-10-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-008306"
      },
      {
        "date": "2017-10-09T15:42:49",
        "db": "PACKETSTORM",
        "id": "144540"
      },
      {
        "date": "2017-09-18T16:29:00.207000",
        "db": "NVD",
        "id": "CVE-2017-0380"
      },
      {
        "date": "2017-09-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201709-858"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-20T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-34623"
      },
      {
        "date": "2017-09-18T00:00:00",
        "db": "BID",
        "id": "101222"
      },
      {
        "date": "2017-10-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-008306"
      },
      {
        "date": "2017-11-06T02:29:00.663000",
        "db": "NVD",
        "id": "CVE-2017-0380"
      },
      {
        "date": "2017-09-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201709-858"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-858"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Tor Vulnerable to information disclosure from log files",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008306"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-858"
      }
    ],
    "trust": 0.6
  }
}

VAR-201402-0035

Vulnerability from variot - Updated: 2023-12-18 13:03

Tor before 0.2.3.23-rc allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a renegotiation attempt that occurs after the initiation of the V3 link protocol. Tor (The Onion Router) is an implementation of the second generation of onion routing, mainly used for anonymous access to the Internet. A denial of service vulnerability exists in versions prior to Tor 0.2.3.23-rc that could allow a remote attacker to compromise an affected application. The application is prone to a remote denial-of-service vulnerability. Attackers may exploit this issue to cause an affected application to crash, resulting in a denial-of-service condition. Versions prior to Tor 0.2.4.4-alpha are vulnerable

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201402-0035",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "torproject",
        "version": "0.1.1.20"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "torproject",
        "version": "0.1.1.22"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "torproject",
        "version": "0.1.1.21"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "torproject",
        "version": "0.1.0.17"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "torproject",
        "version": "0.1.0.16"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "torproject",
        "version": "0.1.0.15"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.9.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.9.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.38"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.37"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.36"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.35"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.34"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.33"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.32"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.31"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.30"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.29"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.28"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.27"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.26"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.23"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.22"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.21"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.20"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.2.19"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.2.0.30"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.2.19"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.2.18"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.2.17"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.2.16"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.2.15"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.2.14"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.2.13"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.1.26"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.1.25"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.1.24"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.1.23"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.0.14"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.0.13"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.0.12"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.0.11"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.1.0.10"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.9.9"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.9.8"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.9.7"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.9.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.9.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.9.4"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.9.10"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.9.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.8.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.7.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.7.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.7.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.7"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.6.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.6.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.4"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "torproject",
        "version": "0.0.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.33"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.34"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.24"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.25"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.18"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.15"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.21"
      },
      {
        "model": "tor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.22"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.14"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.20"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.31"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.35"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.32"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.17"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.19"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.16"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.18"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.13"
      },
      {
        "model": "tor",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "the tor",
        "version": "0.2.3.23-rc"
      },
      {
        "model": "tor \u003c0.2.3.24-rc",
        "scope": null,
        "trust": 0.6,
        "vendor": "torproject",
        "version": null
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.225"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.224"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.35"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.34"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.33"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.32"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.31"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.4.19"
      },
      {
        "model": "tor rc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.24"
      },
      {
        "model": "tor rc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.23"
      },
      {
        "model": "tor rc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.22"
      },
      {
        "model": "tor rc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.21"
      },
      {
        "model": "tor rc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.20"
      },
      {
        "model": "tor rc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.19"
      },
      {
        "model": "tor rc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.18"
      },
      {
        "model": "tor beta",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.17"
      },
      {
        "model": "tor alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.16"
      },
      {
        "model": "tor alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.15"
      },
      {
        "model": "tor alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.14"
      },
      {
        "model": "tor alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.3.13"
      },
      {
        "model": "tor pre27",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre26",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre25",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre24",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre23",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre22",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre21",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre20",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre19",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre18",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre17",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre16",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre15",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre14",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor pre13",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor alpha",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "torproject",
        "version": "0.2.4.4"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00702"
      },
      {
        "db": "BID",
        "id": "65357"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006129"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2249"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-015"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.33:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.35:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.29:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre14:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.35:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.32:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre17:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.23:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.24:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.37:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.14:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:*:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "0.2.3.22",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.13:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.6.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.14:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.7.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre26:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.24:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.6.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.28:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.23:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.20:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.27:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.38:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre24:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.21:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre21:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.18:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.34:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.7.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre19:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre13:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.7.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre23:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.25:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.32:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.16:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre16:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.14:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.36:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.34:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.15:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre27:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.26:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre20:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.25:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre25:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.33:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre15:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.17:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.26:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre22:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.19:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre18:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-2249"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "65357"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2012-2249",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2012-2249",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2014-00702",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2012-2249",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-00702",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201402-015",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00702"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006129"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2249"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-015"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Tor before 0.2.3.23-rc allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a renegotiation attempt that occurs after the initiation of the V3 link protocol. Tor (The Onion Router) is an implementation of the second generation of onion routing, mainly used for anonymous access to the Internet. A denial of service vulnerability exists in versions prior to Tor 0.2.3.23-rc that could allow a remote attacker to compromise an affected application. The application is prone to a remote denial-of-service vulnerability. \nAttackers may exploit this issue to cause an affected application to crash, resulting in a denial-of-service condition. \nVersions prior to Tor 0.2.4.4-alpha are vulnerable",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-2249"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006129"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00702"
      },
      {
        "db": "BID",
        "id": "65357"
      }
    ],
    "trust": 2.43
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-2249",
        "trust": 3.3
      },
      {
        "db": "BID",
        "id": "65357",
        "trust": 0.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006129",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00702",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-015",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00702"
      },
      {
        "db": "BID",
        "id": "65357"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006129"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2249"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-015"
      }
    ]
  },
  "id": "VAR-201402-0035",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00702"
      }
    ],
    "trust": 0.06
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00702"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:03:38.592000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Bug 1060758",
        "trust": 0.8,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060758"
      },
      {
        "title": "ChangeLog",
        "trust": 0.8,
        "url": "https://gitweb.torproject.org/tor.git?a=blob_plain;hb=head;f=changelog"
      },
      {
        "title": "Patch for Tor Remote Denial of Service Vulnerability (CNVD-2014-00702)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/43279"
      },
      {
        "title": "tor_0.2.3.23-rc.orig",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=47817"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00702"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006129"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-015"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-2249"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.5,
        "url": "https://gitweb.torproject.org/tor.git?a=blob_plain;hb=head;f=changelog"
      },
      {
        "trust": 1.0,
        "url": "https://gitweb.torproject.org/tor.git?a=blob_plain%3bhb=head%3bf=changelog"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2249"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2249"
      },
      {
        "trust": 0.8,
        "url": "http://debian.2.n7.nabble.com/bug-691499-unblock-tor-0-2-3-24-rc-1-td2788119.html"
      },
      {
        "trust": 0.3,
        "url": "https://www.torproject.org/index.html.en"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00702"
      },
      {
        "db": "BID",
        "id": "65357"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006129"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2249"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-015"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00702"
      },
      {
        "db": "BID",
        "id": "65357"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006129"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2249"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-015"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-02-11T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-00702"
      },
      {
        "date": "2012-10-20T00:00:00",
        "db": "BID",
        "id": "65357"
      },
      {
        "date": "2014-02-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-006129"
      },
      {
        "date": "2014-02-03T03:55:03.627000",
        "db": "NVD",
        "id": "CVE-2012-2249"
      },
      {
        "date": "2014-02-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201402-015"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-02-11T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-00702"
      },
      {
        "date": "2012-10-20T00:00:00",
        "db": "BID",
        "id": "65357"
      },
      {
        "date": "2014-02-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-006129"
      },
      {
        "date": "2023-11-07T02:10:26.090000",
        "db": "NVD",
        "id": "CVE-2012-2249"
      },
      {
        "date": "2014-02-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201402-015"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-015"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Tor Service disruption in  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006129"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-015"
      }
    ],
    "trust": 0.6
  }
}

VAR-201209-0470

Vulnerability from variot - Updated: 2023-12-18 12:22

The tor_timegm function in common/util.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.22-rc, does not properly validate time values, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed directory object, a different vulnerability than CVE-2012-4419. Tor (The Onion Router) is an implementation of the second generation of onion routing, which allows users to communicate anonymously over the Internet. Tor is prone to multiple denial-of-service vulnerabilities. Exploiting these issues can allow attackers to crash the affected computer, denying service to legitimate users. Versions prior to Tor 0.2.2.39 and 0.2.3.22-rc are vulnerable. The title and technical details have been changed to better reflect the underlying component affected. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201301-03


                                        http://security.gentoo.org/

Severity: Normal Title: Tor: Multiple vulnerabilities Date: January 08, 2013 Bugs: #432188, #434882, #444804 ID: 201301-03


Synopsis

Multiple vulnerabilities have been found in Tor, allowing attackers to cause Denial of Service or obtain sensitive information.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 net-misc/tor < 0.2.3.25 >= 0.2.3.25

Description

Multiple vulnerabilities have been discovered in Tor. Please review the CVE identifiers referenced below for details.

Workaround

There is no known workaround at this time.

Resolution

All Tor users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.3.25"

References

[ 1 ] CVE-2012-3517 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3517 [ 2 ] CVE-2012-3518 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3518 [ 3 ] CVE-2012-3519 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3519 [ 4 ] CVE-2012-4419 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4419 [ 5 ] CVE-2012-4922 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4922 [ 6 ] CVE-2012-5573 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5573

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201301-03.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201209-0470",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.1.0.10"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.0.9.7"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.0.9.4"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.1.0.12"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.1.0.11"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.0.9.8"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.0.9.10"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.0.9.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.0.9.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.0.9.9"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.2.16"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.1.24"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.7.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.21"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.8.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.2.17"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.0.13"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.23"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.7.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.36"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.33"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.6.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.34"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.24"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.0.17"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.30"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.22"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.1.21"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.37"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.25"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.18"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.9.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.15"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.0.15"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.21"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.4"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.9.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.6.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.2.19"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.27"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.20"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.14"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.32"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.20"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.7"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.31"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.35"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.1.26"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.32"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.30"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.0.16"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.35"
      },
      {
        "model": "tor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.38"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.19"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.7.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.17"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.2.15"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.33"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.2.18"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.26"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.28"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.9.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.31"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.19"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.0.14"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.1.20"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.2.13"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.1.25"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.16"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.29"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.1.22"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.18"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.34"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.13"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.2.14"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.1.23"
      },
      {
        "model": "tor",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "the tor",
        "version": "0.2.3.x"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the tor",
        "version": "0.2.3.22-rc"
      },
      {
        "model": "hat fedora",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "red",
        "version": "13"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7649"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004416"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4922"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-319"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "0.2.2.38",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.29:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.32:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.26:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.37:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.36:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.35:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.28:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.27:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.25:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.24:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.14:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.7.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.7.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre21:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre20:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre13:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.21:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.14:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.13:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.32:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.34:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.26:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.25:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.35:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.23:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.7.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre27:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre19:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre18:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.20:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.19:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.33:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.24:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.23:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.34:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.33:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.14:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.6.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.6.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre26:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre25:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre24:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre17:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre16:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.18:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.17:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre23:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre22:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre15:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre14:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.16:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.15:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-4922"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Reported by the vendor",
    "sources": [
      {
        "db": "BID",
        "id": "55519"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2012-4922",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2012-4922",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.5,
            "id": "CNVD-2012-7649",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2012-4922",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2012-7649",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201209-319",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2012-4922",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7649"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-4922"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004416"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4922"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-319"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The tor_timegm function in common/util.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.22-rc, does not properly validate time values, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed directory object, a different vulnerability than CVE-2012-4419. Tor (The Onion Router) is an implementation of the second generation of onion routing, which allows users to communicate anonymously over the Internet. Tor is prone to multiple denial-of-service vulnerabilities. \nExploiting these issues can allow attackers to crash the affected computer, denying service to legitimate users. \nVersions prior to Tor 0.2.2.39 and 0.2.3.22-rc are vulnerable. The title and technical details have been changed to better reflect the underlying component affected. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201301-03\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                            http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n    Title: Tor: Multiple vulnerabilities\n     Date: January 08, 2013\n     Bugs: #432188, #434882, #444804\n       ID: 201301-03\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Tor, allowing attackers to\ncause Denial of Service or obtain sensitive information. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  net-misc/tor                \u003c 0.2.3.25               \u003e= 0.2.3.25\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Tor. Please review the\nCVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Tor users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=net-misc/tor-0.2.3.25\"\n\nReferences\n==========\n\n[ 1 ] CVE-2012-3517\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3517\n[ 2 ] CVE-2012-3518\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3518\n[ 3 ] CVE-2012-3519\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3519\n[ 4 ] CVE-2012-4419\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4419\n[ 5 ] CVE-2012-4922\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4922\n[ 6 ] CVE-2012-5573\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5573\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201301-03.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2013 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-4922"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004416"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7649"
      },
      {
        "db": "BID",
        "id": "55519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-4922"
      },
      {
        "db": "PACKETSTORM",
        "id": "119351"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-4922",
        "trust": 2.9
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2012/09/12/5",
        "trust": 1.7
      },
      {
        "db": "BID",
        "id": "55519",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004416",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7649",
        "trust": 0.6
      },
      {
        "db": "MLIST",
        "id": "[TOR-TALK] 20120912 TOR 0.2.3.22-RC IS OUT",
        "trust": 0.6
      },
      {
        "db": "MLIST",
        "id": "[OSS-SECURITY] 20120912 CVE ID REQUEST: TOR",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-319",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-4922",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "119351",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7649"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-4922"
      },
      {
        "db": "BID",
        "id": "55519"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004416"
      },
      {
        "db": "PACKETSTORM",
        "id": "119351"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4922"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-319"
      }
    ]
  },
  "id": "VAR-201209-0470",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7649"
      }
    ],
    "trust": 0.06
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7649"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:22:10.180000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "openSUSE-SU-2012:1278",
        "trust": 0.8,
        "url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00005.html"
      },
      {
        "title": "Fix assertion failure in tor_timegm.",
        "trust": 0.8,
        "url": "https://gitweb.torproject.org/tor.git/commit/973c18bf0e84d14d8006a9ae97fde7f7fb97e404"
      },
      {
        "title": "[tor-talk] Tor 0.2.3.22-rc is out",
        "trust": 0.8,
        "url": "https://lists.torproject.org/pipermail/tor-talk/2012-september/025501.html"
      },
      {
        "title": "[tor.git] / ReleaseNotes (bump to 0.2.2.39)",
        "trust": 0.8,
        "url": "https://gitweb.torproject.org/tor.git/blob/release-0.2.2:/releasenotes"
      },
      {
        "title": "Ticket #6811",
        "trust": 0.8,
        "url": "https://trac.torproject.org/projects/tor/ticket/6811"
      },
      {
        "title": "calligra-2.5.4",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=44847"
      },
      {
        "title": "radamsa-Fuzzer",
        "trust": 0.1,
        "url": "https://github.com/sunzu94/radamsa-fuzzer "
      },
      {
        "title": "RADAMSA",
        "trust": 0.1,
        "url": "https://github.com/stephenharuna/radamsa "
      },
      {
        "title": "radamsa",
        "trust": 0.1,
        "url": "https://github.com/hwangtaewon/radamsa "
      },
      {
        "title": "radamsa",
        "trust": 0.1,
        "url": "https://github.com/benoit-a/radamsa "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2012-4922"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004416"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-319"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004416"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4922"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "https://trac.torproject.org/projects/tor/ticket/6811"
      },
      {
        "trust": 2.0,
        "url": "https://gitweb.torproject.org/tor.git/blob/release-0.2.2:/releasenotes"
      },
      {
        "trust": 2.0,
        "url": "https://lists.torproject.org/pipermail/tor-talk/2012-september/025501.html"
      },
      {
        "trust": 1.7,
        "url": "https://gitweb.torproject.org/tor.git/commit/973c18bf0e84d14d8006a9ae97fde7f7fb97e404"
      },
      {
        "trust": 1.7,
        "url": "http://openwall.com/lists/oss-security/2012/09/12/5"
      },
      {
        "trust": 1.2,
        "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00005.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-september/088006.html"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4922"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4922"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/55519/info"
      },
      {
        "trust": 0.3,
        "url": "https://www.torproject.org/index.html.en"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/20.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.securityfocus.com/bid/55519"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/sunzu94/radamsa-fuzzer"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4922"
      },
      {
        "trust": 0.1,
        "url": "http://creativecommons.org/licenses/by-sa/2.5"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3517"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3517"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5573"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3519"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4419"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3518"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3519"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4922"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3518"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5573"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4419"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "https://bugs.gentoo.org."
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7649"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-4922"
      },
      {
        "db": "BID",
        "id": "55519"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004416"
      },
      {
        "db": "PACKETSTORM",
        "id": "119351"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4922"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-319"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7649"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-4922"
      },
      {
        "db": "BID",
        "id": "55519"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004416"
      },
      {
        "db": "PACKETSTORM",
        "id": "119351"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4922"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-319"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-09-12T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-7649"
      },
      {
        "date": "2012-09-14T00:00:00",
        "db": "VULMON",
        "id": "CVE-2012-4922"
      },
      {
        "date": "2012-09-12T00:00:00",
        "db": "BID",
        "id": "55519"
      },
      {
        "date": "2012-09-19T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-004416"
      },
      {
        "date": "2013-01-09T02:25:38",
        "db": "PACKETSTORM",
        "id": "119351"
      },
      {
        "date": "2012-09-14T18:55:04.980000",
        "db": "NVD",
        "id": "CVE-2012-4922"
      },
      {
        "date": "2012-09-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201209-319"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-09-12T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-7649"
      },
      {
        "date": "2013-08-22T00:00:00",
        "db": "VULMON",
        "id": "CVE-2012-4922"
      },
      {
        "date": "2015-04-13T20:56:00",
        "db": "BID",
        "id": "55519"
      },
      {
        "date": "2012-11-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-004416"
      },
      {
        "date": "2013-08-22T03:59:11.687000",
        "db": "NVD",
        "id": "CVE-2012-4922"
      },
      {
        "date": "2012-09-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201209-319"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-319"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Tor of  common/util.c Service disruption in  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004416"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-319"
      }
    ],
    "trust": 0.6
  }
}

VAR-201209-0412

Vulnerability from variot - Updated: 2023-12-18 12:22

The compare_tor_addr_to_addr_policy function in or/policies.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.21-rc, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a zero-valued port field that is not properly handled during policy comparison. Tor (The Onion Router) is an implementation of the second generation of onion routing, which allows users to communicate anonymously over the Internet. Tor has denial of service and security restrictions to bypass the vulnerability, which can allow an attacker to bypass certain security restrictions or cause a denial of service. Tor is prone to multiple denial-of-service vulnerabilities. Exploiting these issues can allow attackers to crash the affected computer, denying service to legitimate users. Versions prior to Tor 0.2.2.39 and 0.2.3.22-rc are vulnerable. The title and technical details have been changed to better reflect the underlying component affected. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1


Mandriva Linux Security Advisory MDVSA-2013:132 http://www.mandriva.com/en/support/security/


Package : tor Date : April 10, 2013 Affected: Business Server 1.0


Problem Description:

Updated tor package fixes security vulnerabilities:

Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected (CVE-2011-2768).

Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values (CVE-2011-2769).

routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack (CVE-2012-3519).

Tor before 0.2.2.39, when waiting for a client to renegotiate, allowed it to add bytes to the input buffer, allowing a crash to be caused remotely (tor-5934, tor-6007).

The version of Tor shipped in MBS1 did not have correctly formed systemd unit and thus failed to start.

This updated version corrects this problem and restores working behaviour.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2768 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2769 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3517 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3518 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3519 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4419 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5573 https://wiki.mageia.org/en/Support/Advisories/MGAA-2012-0184 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0276 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0356


Updated Packages:

Mandriva Business Server 1/X86_64: 8cadc920e4452cd2a3551a3cb01d9fcf mbs1/x86_64/tor-0.2.2.39-1.mbs1.x86_64.rpm 7cbba7170bc4f9e6ee8409398437570c mbs1/SRPMS/tor-0.2.2.39-1.mbs1.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFRZVsDmqjQ0CJFipgRAm9IAJ9tYUVrI7u2V+7yJGNLn2OVMdOzcACgyrhf PUIroe88x4NDpj7AUyd2YP8= =x4YG -----END PGP SIGNATURE-----

. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201301-03


                                        http://security.gentoo.org/

Severity: Normal Title: Tor: Multiple vulnerabilities Date: January 08, 2013 Bugs: #432188, #434882, #444804 ID: 201301-03


Synopsis

Multiple vulnerabilities have been found in Tor, allowing attackers to cause Denial of Service or obtain sensitive information.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 net-misc/tor < 0.2.3.25 >= 0.2.3.25

Description

Multiple vulnerabilities have been discovered in Tor. Please review the CVE identifiers referenced below for details.

Workaround

There is no known workaround at this time.

Resolution

All Tor users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.3.25"

References

[ 1 ] CVE-2012-3517 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3517 [ 2 ] CVE-2012-3518 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3518 [ 3 ] CVE-2012-3519 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3519 [ 4 ] CVE-2012-4419 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4419 [ 5 ] CVE-2012-4922 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4922 [ 6 ] CVE-2012-5573 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5573

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201301-03.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5 .

CVE-2012-3518

Avoid an uninitialised memory read when reading a vote or consensus document that has an unrecognized flavour name.

CVE-2012-3519

Try to leak less information about what relays a client is choosing to a side-channel attacker. This fixes a potential DoS issue [tor-5934, tor-6007].

For the stable distribution (squeeze), these problems have been fixed in version 0.2.2.39-1.

For the unstable distribution, these problems have been fixed in version 0.2.3.22-rc-1.

We recommend that you upgrade your tor packages. ----------------------------------------------------------------------

The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/


TITLE: Tor Two Assertion Failure Denial of Service Vulnerabilities

SECUNIA ADVISORY ID: SA50578

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/50578/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=50578

RELEASE DATE: 2012-09-14

DISCUSS ADVISORY: http://secunia.com/advisories/50578/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/50578/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=50578

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: Two vulnerabilities have been reported in Tor, which can be exploited by malicious people to cause a DoS (Denial of Service).

1) An assertion failure within the "tor_timegm()" function when handling time information within a directory object can be exploited to cause a crash.

2) An assertion failure within the "compare_tor_addr_to_addr_policy()" function when handling certain port values can be exploited to crash directory authorities.

SOLUTION: Update to version 0.2.2.39.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: https://gitweb.torproject.org/tor.git/blob/release-0.2.2:/ReleaseNotes

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201209-0412",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.1.0.13"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.1.0.12"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.1.0.17"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.1.1.21"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.1.0.15"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.1.0.11"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.1.0.16"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.1.0.14"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.1.1.20"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.1.1.22"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.0.10"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.2.16"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.9.7"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.1.24"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.7.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.21"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.8.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.2.17"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.9.4"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.23"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.7.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.36"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.33"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.6.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.34"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.24"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.30"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.22"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.37"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.25"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.18"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.9.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.15"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.4"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.9.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.6.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.2.19"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.27"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.20"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.14"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.32"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.20"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.7"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.31"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.35"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.1.26"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.32"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.0.30"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.35"
      },
      {
        "model": "tor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.38"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.19"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.9.8"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.7.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.17"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.9.10"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.2.15"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.9.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.33"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.2.18"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.9.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.26"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.28"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.9.9"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.0.9.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.31"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.19"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.2.13"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.1.25"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.16"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.29"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.18"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.2.34"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.3.13"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.2.14"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.1.1.23"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the tor",
        "version": "0.2.3.21-rc"
      },
      {
        "model": "tor",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "the tor",
        "version": "0.2.3.x"
      },
      {
        "model": "hat fedora",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "red",
        "version": "13"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7649"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004415"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4419"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-318"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.34:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.25:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.24:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.35:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.34:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.33:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.6.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre26:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre25:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre18:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre17:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.18:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.17:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "0.2.2.38",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.33:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.23:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.32:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.14:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.6.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre24:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre23:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre16:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre15:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.16:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.15:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.37:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.36:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.29:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.28:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.0.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.26:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.25:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.7.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre22:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre21:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre14:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre13:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.14:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.13:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.35:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.32:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.27:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.26:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.2.18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.2.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.24:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.1.23:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.14:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.1.0.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.9.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.7.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.7.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre27:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre20:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.0.2:pre19:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.20:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.3.19:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-4419"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Reported by the vendor",
    "sources": [
      {
        "db": "BID",
        "id": "55519"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2012-4419",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2012-4419",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.5,
            "id": "CNVD-2012-7649",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2012-4419",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2012-7649",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201209-318",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7649"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004415"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4419"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-318"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The compare_tor_addr_to_addr_policy function in or/policies.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.21-rc, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a zero-valued port field that is not properly handled during policy comparison. Tor (The Onion Router) is an implementation of the second generation of onion routing, which allows users to communicate anonymously over the Internet. Tor has denial of service and security restrictions to bypass the vulnerability, which can allow an attacker to bypass certain security restrictions or cause a denial of service. Tor is prone to multiple denial-of-service vulnerabilities. \nExploiting these issues can allow attackers to crash the affected computer, denying service to legitimate users. \nVersions prior to Tor 0.2.2.39 and 0.2.3.22-rc are vulnerable. The title and technical details have been changed to better reflect the underlying component affected. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n _______________________________________________________________________\n\n Mandriva Linux Security Advisory                         MDVSA-2013:132\n http://www.mandriva.com/en/support/security/\n _______________________________________________________________________\n\n Package : tor\n Date    : April 10, 2013\n Affected: Business Server 1.0\n _______________________________________________________________________\n\n Problem Description:\n\n Updated tor package fixes security vulnerabilities:\n \n Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS\n certificate chain as part of an outgoing OR connection, which allows\n remote relays to bypass intended anonymity properties by reading this\n chain and then determining the set of entry guards that the client\n or bridge had selected (CVE-2011-2768). \n \n Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE\n and CREATE_FAST values in the Command field of a cell within an OR\n connection that it initiated, which allows remote relays to enumerate\n bridges by using these values (CVE-2011-2769). \n \n routerlist.c in Tor before 0.2.2.38 uses a different amount of time\n for relay-list iteration depending on which relay is chosen, which\n might allow remote attackers to obtain sensitive information about\n relay selection via a timing side-channel attack (CVE-2012-3519). \n \n Tor before 0.2.2.39, when waiting for a client to renegotiate, allowed\n it to add bytes to the input buffer, allowing a crash to be caused\n remotely (tor-5934, tor-6007). \n \n The version of Tor shipped in MBS1 did not have correctly formed\n systemd unit and thus failed to start. \n \n This updated version corrects this problem and restores working\n behaviour. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2768\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2769\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3517\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3518\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3519\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4419\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5573\n https://wiki.mageia.org/en/Support/Advisories/MGAA-2012-0184\n https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0276\n https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0356\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 1/X86_64:\n 8cadc920e4452cd2a3551a3cb01d9fcf  mbs1/x86_64/tor-0.2.2.39-1.mbs1.x86_64.rpm \n 7cbba7170bc4f9e6ee8409398437570c  mbs1/SRPMS/tor-0.2.2.39-1.mbs1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi.  The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security.  You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n  http://www.mandriva.com/en/support/security/advisories/\n\n If you want to report vulnerabilities, please contact\n\n  security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID     Date       User ID\n pub  1024D/22458A98 2000-07-10 Mandriva Security Team\n  \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niD8DBQFRZVsDmqjQ0CJFipgRAm9IAJ9tYUVrI7u2V+7yJGNLn2OVMdOzcACgyrhf\nPUIroe88x4NDpj7AUyd2YP8=\n=x4YG\n-----END PGP SIGNATURE-----\n\n\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201301-03\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                            http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n    Title: Tor: Multiple vulnerabilities\n     Date: January 08, 2013\n     Bugs: #432188, #434882, #444804\n       ID: 201301-03\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Tor, allowing attackers to\ncause Denial of Service or obtain sensitive information. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  net-misc/tor                \u003c 0.2.3.25               \u003e= 0.2.3.25\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Tor. Please review the\nCVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Tor users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=net-misc/tor-0.2.3.25\"\n\nReferences\n==========\n\n[ 1 ] CVE-2012-3517\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3517\n[ 2 ] CVE-2012-3518\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3518\n[ 3 ] CVE-2012-3519\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3519\n[ 4 ] CVE-2012-4419\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4419\n[ 5 ] CVE-2012-4922\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4922\n[ 6 ] CVE-2012-5573\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5573\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201301-03.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2013 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. \n\nCVE-2012-3518\n\n  Avoid an uninitialised memory read when reading a vote or consensus\n  document that has an unrecognized flavour name. \n\nCVE-2012-3519\n\n  Try to leak less information about what relays a client is choosing to\n  a side-channel attacker. This fixes a potential DoS issue\n  [tor-5934, tor-6007]. \n\nFor the stable distribution (squeeze), these problems have been fixed in\nversion 0.2.2.39-1. \n\nFor the unstable distribution, these problems have been fixed in version\n0.2.3.22-rc-1. \n\nWe recommend that you upgrade your tor packages. ----------------------------------------------------------------------\n\nThe final version of the CSI 6.0 has been released. \nFind out why this is not just another Patch Management solution: http://secunia.com/blog/325/\n\n----------------------------------------------------------------------\n\nTITLE:\nTor Two Assertion Failure Denial of Service Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA50578\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/50578/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50578\n\nRELEASE DATE:\n2012-09-14\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/50578/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/50578/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50578\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nTwo vulnerabilities have been reported in Tor, which can be exploited\nby malicious people to cause a DoS (Denial of Service). \n\n1) An assertion failure within the \"tor_timegm()\" function when\nhandling time information within a directory object can be exploited\nto cause a crash. \n\n2) An assertion failure within the\n\"compare_tor_addr_to_addr_policy()\" function when handling certain\nport values can be exploited to crash directory authorities. \n\nSOLUTION:\nUpdate to version 0.2.2.39. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttps://gitweb.torproject.org/tor.git/blob/release-0.2.2:/ReleaseNotes\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-4419"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004415"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7649"
      },
      {
        "db": "BID",
        "id": "55519"
      },
      {
        "db": "PACKETSTORM",
        "id": "121258"
      },
      {
        "db": "PACKETSTORM",
        "id": "119351"
      },
      {
        "db": "PACKETSTORM",
        "id": "116520"
      },
      {
        "db": "PACKETSTORM",
        "id": "116554"
      },
      {
        "db": "PACKETSTORM",
        "id": "116570"
      }
    ],
    "trust": 2.88
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-4419",
        "trust": 3.0
      },
      {
        "db": "SECUNIA",
        "id": "50583",
        "trust": 1.7
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2012/09/13/2",
        "trust": 1.6
      },
      {
        "db": "BID",
        "id": "55519",
        "trust": 0.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004415",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "50578",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7649",
        "trust": 0.6
      },
      {
        "db": "MLIST",
        "id": "[OSS-SECURITY] 20120912 RE: CVE ID REQUEST: TOR",
        "trust": 0.6
      },
      {
        "db": "MLIST",
        "id": "[TOR-TALK] 20120905 TOR 0.2.3.21-RC IS OUT",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-318",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "121258",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "119351",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "116520",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "116554",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "116570",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7649"
      },
      {
        "db": "BID",
        "id": "55519"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004415"
      },
      {
        "db": "PACKETSTORM",
        "id": "121258"
      },
      {
        "db": "PACKETSTORM",
        "id": "119351"
      },
      {
        "db": "PACKETSTORM",
        "id": "116520"
      },
      {
        "db": "PACKETSTORM",
        "id": "116554"
      },
      {
        "db": "PACKETSTORM",
        "id": "116570"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4419"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-318"
      }
    ]
  },
  "id": "VAR-201209-0412",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7649"
      }
    ],
    "trust": 0.06
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7649"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:22:10.224000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "openSUSE-SU-2012:1278",
        "trust": 0.8,
        "url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00005.html"
      },
      {
        "title": "Do not assert when comparing a null address/port against a policy",
        "trust": 0.8,
        "url": "https://gitweb.torproject.org/tor.git/commit/62d96284f7e0f81c40d5df7e53dd7b4dfe7e56a5"
      },
      {
        "title": "[tor-talk] Tor 0.2.3.21-rc is out",
        "trust": 0.8,
        "url": "https://lists.torproject.org/pipermail/tor-talk/2012-september/025434.html"
      },
      {
        "title": "[tor.git] / ReleaseNotes (bump to 0.2.2.39)",
        "trust": 0.8,
        "url": "https://gitweb.torproject.org/tor.git/blob/release-0.2.2:/releasenotes"
      },
      {
        "title": "Ticket #6690",
        "trust": 0.8,
        "url": "https://trac.torproject.org/projects/tor/ticket/6690"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004415"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-4419"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "https://gitweb.torproject.org/tor.git/blob/release-0.2.2:/releasenotes"
      },
      {
        "trust": 1.6,
        "url": "http://openwall.com/lists/oss-security/2012/09/13/2"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/50583"
      },
      {
        "trust": 1.6,
        "url": "https://gitweb.torproject.org/tor.git/commit/62d96284f7e0f81c40d5df7e53dd7b4dfe7e56a5"
      },
      {
        "trust": 1.6,
        "url": "https://lists.torproject.org/pipermail/tor-talk/2012-september/025434.html"
      },
      {
        "trust": 1.6,
        "url": "https://trac.torproject.org/projects/tor/ticket/6690"
      },
      {
        "trust": 1.1,
        "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml"
      },
      {
        "trust": 1.0,
        "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-september/088006.html"
      },
      {
        "trust": 1.0,
        "url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00005.html"
      },
      {
        "trust": 0.9,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4419"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4419"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/55519/info"
      },
      {
        "trust": 0.6,
        "url": "https://trac.torproject.org/projects/tor/ticket/6811"
      },
      {
        "trust": 0.6,
        "url": "http://secunia.com/advisories/50578"
      },
      {
        "trust": 0.3,
        "url": "https://lists.torproject.org/pipermail/tor-talk/2012-september/025501.html"
      },
      {
        "trust": 0.3,
        "url": "https://www.torproject.org/index.html.en"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3519"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4419"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3518"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3517"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5573"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/blog/325/"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2769"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3518"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2768"
      },
      {
        "trust": 0.1,
        "url": "https://wiki.mageia.org/en/support/advisories/mgasa-2012-0276"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/en/support/security/"
      },
      {
        "trust": 0.1,
        "url": "https://wiki.mageia.org/en/support/advisories/mgaa-2012-0184"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/en/support/security/advisories/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2768"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5573"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3519"
      },
      {
        "trust": 0.1,
        "url": "https://wiki.mageia.org/en/support/advisories/mgasa-2012-0356"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2769"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3517"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4922"
      },
      {
        "trust": 0.1,
        "url": "http://creativecommons.org/licenses/by-sa/2.5"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3517"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5573"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3519"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4922"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3518"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4419"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "https://bugs.gentoo.org."
      },
      {
        "trust": 0.1,
        "url": "http://www.debian.org/security/faq"
      },
      {
        "trust": 0.1,
        "url": "http://www.debian.org/security/"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50583"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/50583/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/50583/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://www.debian.org/security/2012/dsa-2548"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50578"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/50578/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/50578/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7649"
      },
      {
        "db": "BID",
        "id": "55519"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004415"
      },
      {
        "db": "PACKETSTORM",
        "id": "121258"
      },
      {
        "db": "PACKETSTORM",
        "id": "119351"
      },
      {
        "db": "PACKETSTORM",
        "id": "116520"
      },
      {
        "db": "PACKETSTORM",
        "id": "116554"
      },
      {
        "db": "PACKETSTORM",
        "id": "116570"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4419"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-318"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7649"
      },
      {
        "db": "BID",
        "id": "55519"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004415"
      },
      {
        "db": "PACKETSTORM",
        "id": "121258"
      },
      {
        "db": "PACKETSTORM",
        "id": "119351"
      },
      {
        "db": "PACKETSTORM",
        "id": "116520"
      },
      {
        "db": "PACKETSTORM",
        "id": "116554"
      },
      {
        "db": "PACKETSTORM",
        "id": "116570"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4419"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-318"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-09-12T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-7649"
      },
      {
        "date": "2012-09-12T00:00:00",
        "db": "BID",
        "id": "55519"
      },
      {
        "date": "2012-09-19T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-004415"
      },
      {
        "date": "2013-04-11T02:39:54",
        "db": "PACKETSTORM",
        "id": "121258"
      },
      {
        "date": "2013-01-09T02:25:38",
        "db": "PACKETSTORM",
        "id": "119351"
      },
      {
        "date": "2012-09-14T01:52:39",
        "db": "PACKETSTORM",
        "id": "116520"
      },
      {
        "date": "2012-09-14T04:04:24",
        "db": "PACKETSTORM",
        "id": "116554"
      },
      {
        "date": "2012-09-17T09:28:58",
        "db": "PACKETSTORM",
        "id": "116570"
      },
      {
        "date": "2012-09-14T18:55:04.917000",
        "db": "NVD",
        "id": "CVE-2012-4419"
      },
      {
        "date": "2012-09-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201209-318"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-09-12T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-7649"
      },
      {
        "date": "2015-04-13T20:56:00",
        "db": "BID",
        "id": "55519"
      },
      {
        "date": "2012-11-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-004415"
      },
      {
        "date": "2013-08-22T03:58:20.713000",
        "db": "NVD",
        "id": "CVE-2012-4419"
      },
      {
        "date": "2012-09-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201209-318"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "121258"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-318"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Tor of  or/policies.c Service disruption in  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004415"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-318"
      }
    ],
    "trust": 0.6
  }
}

VAR-201401-0517

Vulnerability from variot - Updated: 2023-12-18 11:42

Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors. Tor (The Onion Router) is an implementation of the second generation onion routing, which is mainly used to access the Internet anonymously. There are security holes in Tor. An attacker could use this vulnerability to bypass security restrictions. There are vulnerabilities in Tor 0.2.4.19. Other versions may also be affected. This may aid in further attacks.

Update to version 0.2.4.22 solves these major and security problems:

  • Block authority signing keys that were used on authorities vulnerable to the heartbleed bug in OpenSSL (CVE-2014-0160).

  • Fix a memory leak that could occur if a microdescriptor parse fails during the tokenizing step.

  • The relay ciphersuite list is now generated automatically based on uniform criteria, and includes all OpenSSL ciphersuites with acceptable strength and forward secrecy.

  • Relays now trust themselves to have a better view than clients of which TLS ciphersuites are better than others.

  • Clients now try to advertise the same list of ciphersuites as Firefox 28.

For other changes see the upstream change log


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7295 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160 http://advisories.mageia.org/MGASA-2014-0059.html http://advisories.mageia.org/MGASA-2014-0256.html


Updated Packages:

Mandriva Business Server 1/X86_64: 77035fd2ff3c6df5effbaf9ee78bdaf4 mbs1/x86_64/tor-0.2.4.22-1.mbs1.x86_64.rpm cccaec1a8425ebfce0bb7d8057d38d6e mbs1/SRPMS/tor-0.2.4.22-1.mbs1.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFTmDAPmqjQ0CJFipgRAqq4AJ9ZIEn/fqUynENotuSA2kTLnKwpJgCgkh59 ssWQCdn4l3H2KyxX+IQBsxw= =fSis -----END PGP SIGNATURE-----

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201401-0517",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.2.4.9"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.2.4.10"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.2.4.6"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.2.4.1"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.2.4.4"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.2.4.3"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.2.4.8"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.2.4.2"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.2.4.5"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "torproject",
        "version": "0.2.4.7"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.4.16"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.4.17"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.4.15"
      },
      {
        "model": "tor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.4.19"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.4.13"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.4.18"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.4.14"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.4.12"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "torproject",
        "version": "0.2.4.11"
      },
      {
        "model": "tor",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "the tor",
        "version": "0.2.4.20"
      },
      {
        "model": "tor",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "tor",
        "version": "0.2.4.19"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00091"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005865"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7295"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-371"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "0.2.4.19",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.4.18:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.4.10:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.4.9:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.4.2:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.4.1:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.4.17:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.4.16:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.4.15:rc:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.4.8:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.4.7:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.4.14:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.4.13:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.4.6:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.4.5:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.4.12:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.4.11:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.4.4:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:torproject:tor:0.2.4.3:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-7295"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unknown",
    "sources": [
      {
        "db": "BID",
        "id": "64651"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-7295",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2013-7295",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2014-00091",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2013-7295",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-00091",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201401-371",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00091"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005865"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7295"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-371"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors. Tor (The Onion Router) is an implementation of the second generation onion routing, which is mainly used to access the Internet anonymously. \nThere are security holes in Tor. An attacker could use this vulnerability to bypass security restrictions. There are vulnerabilities in Tor 0.2.4.19. Other versions may also be affected. This may aid in further attacks. \n \n Update to version 0.2.4.22 solves these major and security problems:\n \n - Block authority signing keys that were used on authorities vulnerable\n to the heartbleed bug in OpenSSL (CVE-2014-0160). \n \n - Fix a memory leak that could occur if a microdescriptor parse fails\n during the tokenizing step. \n \n - The relay ciphersuite list is now generated automatically based on\n uniform criteria, and includes all OpenSSL ciphersuites with acceptable\n strength and forward secrecy. \n \n - Relays now trust themselves to have a better view than clients of\n which TLS ciphersuites are better than others. \n \n - Clients now try to advertise the same list of ciphersuites as\n Firefox 28. \n \n For other changes see the upstream change log\n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7295\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160\n http://advisories.mageia.org/MGASA-2014-0059.html\n http://advisories.mageia.org/MGASA-2014-0256.html\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 1/X86_64:\n 77035fd2ff3c6df5effbaf9ee78bdaf4  mbs1/x86_64/tor-0.2.4.22-1.mbs1.x86_64.rpm \n cccaec1a8425ebfce0bb7d8057d38d6e  mbs1/SRPMS/tor-0.2.4.22-1.mbs1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi.  The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security.  You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n  http://www.mandriva.com/en/support/security/advisories/\n\n If you want to report vulnerabilities, please contact\n\n  security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID     Date       User ID\n pub  1024D/22458A98 2000-07-10 Mandriva Security Team\n  \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niD8DBQFTmDAPmqjQ0CJFipgRAqq4AJ9ZIEn/fqUynENotuSA2kTLnKwpJgCgkh59\nssWQCdn4l3H2KyxX+IQBsxw=\n=fSis\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-7295"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005865"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00091"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-078"
      },
      {
        "db": "BID",
        "id": "64651"
      },
      {
        "db": "PACKETSTORM",
        "id": "127069"
      }
    ],
    "trust": 3.06
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-7295",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "64651",
        "trust": 1.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005865",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00091",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-078",
        "trust": 0.6
      },
      {
        "db": "MLIST",
        "id": "[TOR-TALK] 20131223 TOR 0.2.4.20 IS RELEASED",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-371",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "127069",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00091"
      },
      {
        "db": "BID",
        "id": "64651"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005865"
      },
      {
        "db": "PACKETSTORM",
        "id": "127069"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7295"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-078"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-371"
      }
    ]
  },
  "id": "VAR-201401-0517",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00091"
      }
    ],
    "trust": 0.06
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00091"
      }
    ]
  },
  "last_update_date": "2023-12-18T11:42:58.144000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "[tor-talk] Tor 0.2.4.20 is released",
        "trust": 0.8,
        "url": "https://lists.torproject.org/pipermail/tor-talk/2013-december/031483.html"
      },
      {
        "title": "Tor random number generation vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/42181"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00091"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005865"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-310",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005865"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7295"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.9,
        "url": "https://lists.torproject.org/pipermail/tor-talk/2013-december/031483.html"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/bid/64651"
      },
      {
        "trust": 1.0,
        "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00095.html"
      },
      {
        "trust": 0.9,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-7295"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-7295"
      },
      {
        "trust": 0.3,
        "url": "https://www.torproject.org/index.html.en"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-7295"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0160"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/en/support/security/"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/en/support/security/advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://advisories.mageia.org/mgasa-2014-0059.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0160"
      },
      {
        "trust": 0.1,
        "url": "http://advisories.mageia.org/mgasa-2014-0256.html"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00091"
      },
      {
        "db": "BID",
        "id": "64651"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005865"
      },
      {
        "db": "PACKETSTORM",
        "id": "127069"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7295"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-078"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-371"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00091"
      },
      {
        "db": "BID",
        "id": "64651"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005865"
      },
      {
        "db": "PACKETSTORM",
        "id": "127069"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7295"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-078"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-371"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-01-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-00091"
      },
      {
        "date": "2013-12-23T00:00:00",
        "db": "BID",
        "id": "64651"
      },
      {
        "date": "2014-01-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-005865"
      },
      {
        "date": "2014-06-12T13:43:49",
        "db": "PACKETSTORM",
        "id": "127069"
      },
      {
        "date": "2014-01-17T21:55:14.613000",
        "db": "NVD",
        "id": "CVE-2013-7295"
      },
      {
        "date": "2013-12-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201401-078"
      },
      {
        "date": "2014-01-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201401-371"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-01-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-00091"
      },
      {
        "date": "2014-06-11T19:35:00",
        "db": "BID",
        "id": "64651"
      },
      {
        "date": "2014-01-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-005865"
      },
      {
        "date": "2014-02-12T04:50:11.530000",
        "db": "NVD",
        "id": "CVE-2013-7295"
      },
      {
        "date": "2014-01-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201401-078"
      },
      {
        "date": "2014-01-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201401-371"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "64651"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-078"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Tor Vulnerability bypasses cryptographic protection mechanisms",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005865"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "encryption problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-371"
      }
    ],
    "trust": 0.6
  }
}

FKIE_CVE-2023-23589

Vulnerability from fkie_nvd - Published: 2023-01-14 01:15 - Updated: 2025-04-07 19:15
Summary
The SafeSocks option in Tor before 0.4.7.13 has a logic error in which the unsafe SOCKS4 protocol can be used but not the safe SOCKS4a protocol, aka TROVE-2022-002.
References
cve@mitre.orghttps://gitlab.torproject.org/tpo/core/tor/-/commit/a282145b3634547ab84ccd959d0537c021ff7ffcPatch, Vendor Advisory
cve@mitre.orghttps://gitlab.torproject.org/tpo/core/tor/-/issues/40730Exploit, Issue Tracking, Patch, Vendor Advisory
cve@mitre.orghttps://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.7/ReleaseNotesRelease Notes, Vendor Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/01/msg00026.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IYOLTP6HQO2HPXUYKOR7P5YYYN7CINQQ/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMY4FWXYKP3MDXTZ3EJ7XJVGBCKBK2XL/
cve@mitre.orghttps://security.gentoo.org/glsa/202305-11
cve@mitre.orghttps://www.debian.org/security/2023/dsa-5320Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.torproject.org/tpo/core/tor/-/commit/a282145b3634547ab84ccd959d0537c021ff7ffcPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.torproject.org/tpo/core/tor/-/issues/40730Exploit, Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.7/ReleaseNotesRelease Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/01/msg00026.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IYOLTP6HQO2HPXUYKOR7P5YYYN7CINQQ/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMY4FWXYKP3MDXTZ3EJ7XJVGBCKBK2XL/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202305-11
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5320Third Party Advisory
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "12B2A54B-3113-4BB0-82D6-27EC4D1F4043",
              "versionEndExcluding": "0.4.7.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SafeSocks option in Tor before 0.4.7.13 has a logic error in which the unsafe SOCKS4 protocol can be used but not the safe SOCKS4a protocol, aka TROVE-2022-002."
    },
    {
      "lang": "es",
      "value": "La opci\u00f3n SafeSocks en Tor anterior a 0.4.7.13 tiene un error l\u00f3gico en el que se puede usar el protocolo SOCKS4 inseguro pero no el protocolo SOCKS4a seguro, tambi\u00e9n conocido como TROVE-2022-002."
    }
  ],
  "id": "CVE-2023-23589",
  "lastModified": "2025-04-07T19:15:52.637",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.5,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-01-14T01:15:15.627",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://gitlab.torproject.org/tpo/core/tor/-/commit/a282145b3634547ab84ccd959d0537c021ff7ffc"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40730"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.7/ReleaseNotes"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00026.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IYOLTP6HQO2HPXUYKOR7P5YYYN7CINQQ/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMY4FWXYKP3MDXTZ3EJ7XJVGBCKBK2XL/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/202305-11"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5320"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://gitlab.torproject.org/tpo/core/tor/-/commit/a282145b3634547ab84ccd959d0537c021ff7ffc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40730"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.7/ReleaseNotes"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00026.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IYOLTP6HQO2HPXUYKOR7P5YYYN7CINQQ/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMY4FWXYKP3MDXTZ3EJ7XJVGBCKBK2XL/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202305-11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5320"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-693"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2022-33903

Vulnerability from fkie_nvd - Published: 2022-07-17 23:15 - Updated: 2024-11-21 07:08

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A38EEEED-6F12-4B23-807C-85A7A47A845F",
              "versionEndExcluding": "0.4.7.8",
              "versionStartIncluding": "0.4.7.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Tor 0.4.7.x before 0.4.7.8 allows a denial of service via the wedging of RTT estimation."
    },
    {
      "lang": "es",
      "value": "Tor versiones 0.4.7.x anteriores a 0.4.7.8, permite una denegaci\u00f3n de servicio por medio de la estimaci\u00f3n del RTT"
    }
  ],
  "id": "CVE-2022-33903",
  "lastModified": "2024-11-21T07:08:34.123",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-07-17T23:15:09.103",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://lists.torproject.org/pipermail/tor-announce/2022-June/000242.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2022-33903"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/202305-11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://lists.torproject.org/pipermail/tor-announce/2022-June/000242.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2022-33903"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202305-11"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2021-46702

Vulnerability from fkie_nvd - Published: 2022-02-26 03:15 - Updated: 2024-11-21 06:34
Summary
Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclosure. This could allow local attackers to bypass the intended anonymity feature and obtain information regarding the onion services visited by a local user. This can be accomplished by analyzing RAM memory even several hours after the local user used the product. This occurs because the product doesn't properly free memory.
Impacted products
Vendor Product Version
torproject tor 9.0.7
microsoft windows -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:torproject:tor:9.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3535EA-B5BF-48E9-BBC1-F0FAEB438C7E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclosure. This could allow local attackers to bypass the intended anonymity feature and obtain information regarding the onion services visited by a local user. This can be accomplished by analyzing RAM memory even several hours after the local user used the product. This occurs because the product doesn\u0027t properly free memory."
    },
    {
      "lang": "es",
      "value": "Tor Browser versi\u00f3n 9.0.7 en Windows 10 build 10586, es vulnerable a una divulgaci\u00f3n de informaci\u00f3n. Esto podr\u00eda permitir a atacantes locales omitir la funci\u00f3n de anonimato prevista y obtener informaci\u00f3n sobre los servicios onion visitados por un usuario local. Esto puede lograrse al analizar memoria RAM incluso varias horas despu\u00e9s de que el usuario local haya usado el producto. Esto ocurre porque el producto no libera apropiadamente la memoria.\n"
    }
  ],
  "id": "CVE-2021-46702",
  "lastModified": "2024-11-21T06:34:35.990",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-26T03:15:07.407",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://www.sciencedirect.com/science/article/pii/S0167404821001358"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://www.sciencedirect.com/science/article/pii/S0167404821001358"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-404"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2021-38385

Vulnerability from fkie_nvd - Published: 2021-08-30 05:15 - Updated: 2024-11-21 06:16
Summary
Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship between batch-signature verification and single-signature verification, leading to a remote assertion failure, aka TROVE-2021-007.
Impacted products
Vendor Product Version
torproject tor *
torproject tor *
torproject tor *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C159792-8514-46D7-A94C-C8C6F5983E18",
              "versionEndExcluding": "0.3.5.16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3450D899-26F1-481F-BA7F-DB46F4DC3413",
              "versionEndExcluding": "0.4.5.10",
              "versionStartIncluding": "0.4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BF13590-870D-4633-83E3-FE03C73305B0",
              "versionEndExcluding": "0.4.6.7",
              "versionStartIncluding": "0.4.6.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship between batch-signature verification and single-signature verification, leading to a remote assertion failure, aka TROVE-2021-007."
    },
    {
      "lang": "es",
      "value": "Tor versiones anteriores a 0.3.5.16, 0.4.5.10, y 0.4.6.7, maneja inapropiadamente la relaci\u00f3n entre la verificaci\u00f3n de firma por lotes y la verificaci\u00f3n de firma \u00fanica, conllevando a un fallo de aserci\u00f3n remota, tambi\u00e9n se conoce como TROVE-2021-007."
    }
  ],
  "id": "CVE-2021-38385",
  "lastModified": "2024-11-21T06:16:57.803",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-08-30T05:15:07.237",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://blog.torproject.org"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://blog.torproject.org/node/2062"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugs.torproject.org/tpo/core/tor/40078"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/202305-11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://blog.torproject.org"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://blog.torproject.org/node/2062"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugs.torproject.org/tpo/core/tor/40078"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202305-11"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-617"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2021-34550

Vulnerability from fkie_nvd - Published: 2021-06-29 12:15 - Updated: 2024-11-21 06:10
Summary
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006. The v3 onion service descriptor parsing allows out-of-bounds memory access, and a client crash, via a crafted onion service descriptor
Impacted products
Vendor Product Version
torproject tor *
torproject tor *
torproject tor *
torproject tor *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2666B22-DC07-4BFA-A756-3DC4E970EBDD",
              "versionEndExcluding": "0.3.5.15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "072B35B0-7EBF-4652-BB89-12B4BEC9A8EF",
              "versionEndExcluding": "0.4.4.9",
              "versionStartIncluding": "0.4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57ED9234-622B-4B0D-8E29-2851A87DE0D1",
              "versionEndExcluding": "0.4.5.9",
              "versionStartIncluding": "0.4.5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFD89230-DBEF-4134-9C42-8187CE542B7C",
              "versionEndExcluding": "0.4.6.5",
              "versionStartIncluding": "0.4.6.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006. The v3 onion service descriptor parsing allows out-of-bounds memory access, and a client crash, via a crafted onion service descriptor"
    },
    {
      "lang": "es",
      "value": "Se ha detectado un problema en Tor versiones anteriores a 0.4.6.5, tambi\u00e9n se conoce como TROVE-2021-006. El an\u00e1lisis del descriptor del servicio de v3 onion, permite un acceso a la memoria fuera de l\u00edmites, y un bloqueo del cliente, por medio de un descriptor de servicio onion dise\u00f1ado"
    }
  ],
  "id": "CVE-2021-34550",
  "lastModified": "2024-11-21T06:10:39.317",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-06-29T12:15:08.670",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://blog.torproject.org/node/2041"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40392"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202107-25"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://blog.torproject.org/node/2041"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40392"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202107-25"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2021-34549

Vulnerability from fkie_nvd - Published: 2021-06-29 12:15 - Updated: 2024-11-21 06:10
Summary
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency.
Impacted products
Vendor Product Version
torproject tor *
torproject tor *
torproject tor *
torproject tor *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2666B22-DC07-4BFA-A756-3DC4E970EBDD",
              "versionEndExcluding": "0.3.5.15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "072B35B0-7EBF-4652-BB89-12B4BEC9A8EF",
              "versionEndExcluding": "0.4.4.9",
              "versionStartIncluding": "0.4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57ED9234-622B-4B0D-8E29-2851A87DE0D1",
              "versionEndExcluding": "0.4.5.9",
              "versionStartIncluding": "0.4.5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFD89230-DBEF-4134-9C42-8187CE542B7C",
              "versionEndExcluding": "0.4.6.5",
              "versionStartIncluding": "0.4.6.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency."
    },
    {
      "lang": "es",
      "value": "Se ha detectado un problema en Tor versiones anteriores a 0.4.6.5, tambi\u00e9n se conoce como TROVE-2021-005. Un hashing es manejado inapropiadamente para determinadas recuperaciones de datos del circuito. Consecuentemente, un atacante puede desencadenar un ID de circuito elegido por el atacante para causar ineficiencia en el algoritmo"
    }
  ],
  "id": "CVE-2021-34549",
  "lastModified": "2024-11-21T06:10:39.140",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-06-29T12:15:08.643",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://blog.torproject.org/node/2041"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40391"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202107-25"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://blog.torproject.org/node/2041"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40391"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202107-25"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2021-34548

Vulnerability from fkie_nvd - Published: 2021-06-29 11:15 - Updated: 2024-11-21 06:10

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2666B22-DC07-4BFA-A756-3DC4E970EBDD",
              "versionEndExcluding": "0.3.5.15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "072B35B0-7EBF-4652-BB89-12B4BEC9A8EF",
              "versionEndExcluding": "0.4.4.9",
              "versionStartIncluding": "0.4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57ED9234-622B-4B0D-8E29-2851A87DE0D1",
              "versionEndExcluding": "0.4.5.9",
              "versionStartIncluding": "0.4.5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFD89230-DBEF-4134-9C42-8187CE542B7C",
              "versionEndExcluding": "0.4.6.5",
              "versionStartIncluding": "0.4.6.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream."
    },
    {
      "lang": "es",
      "value": "Se ha detectado un problema en Tor versiones anteriores a 0.4.6.5, tambi\u00e9n se conoce como TROVE-2021-003. Un atacante puede falsificar las funciones  RELAY_END o RELAY_RESOLVED para omitir el control de acceso previsto para terminar un flujo"
    }
  ],
  "id": "CVE-2021-34548",
  "lastModified": "2024-11-21T06:10:38.977",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-06-29T11:15:07.883",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/163510/Tor-Half-Closed-Connection-Stream-Confusion.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://blog.torproject.org/node/2041"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40389"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202107-25"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/163510/Tor-Half-Closed-Connection-Stream-Confusion.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://blog.torproject.org/node/2041"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40389"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202107-25"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-290"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2021-28090

Vulnerability from fkie_nvd - Published: 2021-03-19 05:15 - Updated: 2024-11-21 05:59

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "43571CF8-3E89-4207-85A4-809927C4E8B1",
              "versionEndExcluding": "0.3.5.14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "172491E9-1095-4908-8D59-F65C7639FDAF",
              "versionEndExcluding": "0.4.4.8",
              "versionStartIncluding": "0.4.4.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7449C9D-05ED-49E4-A3D9-674B44E032F9",
              "versionEndExcluding": "0.4.5.7",
              "versionStartIncluding": "0.4.5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:0.4.4.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "C3708B4D-8F02-47B4-81E8-AA626B04C906",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:0.4.4.1:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "2143F2C0-BBD4-4B14-84D6-70125DD37376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:0.4.4.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "85811EFA-8639-439D-BC97-52C70D5937E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:0.4.4.3:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "419573B8-18FB-4BEA-8C21-023BA05B3D8E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
              "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Tor before 0.4.5.7 allows a remote attacker to cause Tor directory authorities to exit with an assertion failure, aka TROVE-2021-002."
    },
    {
      "lang": "es",
      "value": "Tor versiones anteriores a 0.4.5.7, permite a un atacante remoto causar que autoridades del directorio de Tor salgan con un fallo de aserci\u00f3n, tambi\u00e9n se conoce como TROVE-2021-002"
    }
  ],
  "id": "CVE-2021-28090",
  "lastModified": "2024-11-21T05:59:04.210",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-03-19T05:15:12.870",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://blog.torproject.org/node/2009"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugs.torproject.org/tpo/core/tor/40316"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40316"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HPDXB2GZHG3VNOTWSXQ3QZVHNV76WCU5/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202107-25"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://blog.torproject.org/node/2009"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugs.torproject.org/tpo/core/tor/40316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HPDXB2GZHG3VNOTWSXQ3QZVHNV76WCU5/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202107-25"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-617"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2021-28089

Vulnerability from fkie_nvd - Published: 2021-03-19 05:15 - Updated: 2024-11-21 05:59

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "43571CF8-3E89-4207-85A4-809927C4E8B1",
              "versionEndExcluding": "0.3.5.14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "172491E9-1095-4908-8D59-F65C7639FDAF",
              "versionEndExcluding": "0.4.4.8",
              "versionStartIncluding": "0.4.4.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7449C9D-05ED-49E4-A3D9-674B44E032F9",
              "versionEndExcluding": "0.4.5.7",
              "versionStartIncluding": "0.4.5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:0.4.4.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "C3708B4D-8F02-47B4-81E8-AA626B04C906",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:0.4.4.1:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "2143F2C0-BBD4-4B14-84D6-70125DD37376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:0.4.4.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "85811EFA-8639-439D-BC97-52C70D5937E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:torproject:tor:0.4.4.3:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "419573B8-18FB-4BEA-8C21-023BA05B3D8E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
              "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Tor before 0.4.5.7 allows a remote participant in the Tor directory protocol to exhaust CPU resources on a target, aka TROVE-2021-001."
    },
    {
      "lang": "es",
      "value": "Tor versiones anteriores a 0.4.5.7, permite a un participante remoto en el protocolo de directorio de Tor agotar los recursos de la CPU en un objetivo, tambi\u00e9n se conoce como TROVE-2021-001"
    }
  ],
  "id": "CVE-2021-28089",
  "lastModified": "2024-11-21T05:59:04.063",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-03-19T05:15:12.807",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://blog.torproject.org/node/2009"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40304"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HPDXB2GZHG3VNOTWSXQ3QZVHNV76WCU5/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202107-25"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://blog.torproject.org/node/2009"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40304"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HPDXB2GZHG3VNOTWSXQ3QZVHNV76WCU5/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202107-25"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2023-23589 (GCVE-0-2023-23589)

Vulnerability from cvelistv5 – Published: 2023-01-14 00:00 – Updated: 2025-04-07 18:14
VLAI?
Summary
The SafeSocks option in Tor before 0.4.7.13 has a logic error in which the unsafe SOCKS4 protocol can be used but not the safe SOCKS4a protocol, aka TROVE-2022-002.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:35:33.384Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.7/ReleaseNotes"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40730"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.torproject.org/tpo/core/tor/-/commit/a282145b3634547ab84ccd959d0537c021ff7ffc"
          },
          {
            "name": "DSA-5320",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5320"
          },
          {
            "name": "FEDORA-2023-c290171664",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMY4FWXYKP3MDXTZ3EJ7XJVGBCKBK2XL/"
          },
          {
            "name": "FEDORA-2023-1254a1fc28",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IYOLTP6HQO2HPXUYKOR7P5YYYN7CINQQ/"
          },
          {
            "name": "[debian-lts-announce] 20230128 [SECURITY] [DLA 3286-1] tor security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00026.html"
          },
          {
            "name": "GLSA-202305-11",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202305-11"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-23589",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-07T18:13:18.347462Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-693",
                "description": "CWE-693 Protection Mechanism Failure",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-07T18:14:11.104Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The SafeSocks option in Tor before 0.4.7.13 has a logic error in which the unsafe SOCKS4 protocol can be used but not the safe SOCKS4a protocol, aka TROVE-2022-002."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-03T00:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.7/ReleaseNotes"
        },
        {
          "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40730"
        },
        {
          "url": "https://gitlab.torproject.org/tpo/core/tor/-/commit/a282145b3634547ab84ccd959d0537c021ff7ffc"
        },
        {
          "name": "DSA-5320",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.debian.org/security/2023/dsa-5320"
        },
        {
          "name": "FEDORA-2023-c290171664",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMY4FWXYKP3MDXTZ3EJ7XJVGBCKBK2XL/"
        },
        {
          "name": "FEDORA-2023-1254a1fc28",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IYOLTP6HQO2HPXUYKOR7P5YYYN7CINQQ/"
        },
        {
          "name": "[debian-lts-announce] 20230128 [SECURITY] [DLA 3286-1] tor security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00026.html"
        },
        {
          "name": "GLSA-202305-11",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.gentoo.org/glsa/202305-11"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-23589",
    "datePublished": "2023-01-14T00:00:00.000Z",
    "dateReserved": "2023-01-14T00:00:00.000Z",
    "dateUpdated": "2025-04-07T18:14:11.104Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-33903 (GCVE-0-2022-33903)

Vulnerability from cvelistv5 – Published: 2022-07-17 00:00 – Updated: 2024-08-03 08:09
VLAI?
Summary
Tor 0.4.7.x before 0.4.7.8 allows a denial of service via the wedging of RTT estimation.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T08:09:22.727Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.torproject.org/pipermail/tor-announce/2022-June/000242.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security-tracker.debian.org/tracker/CVE-2022-33903"
          },
          {
            "name": "GLSA-202305-11",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202305-11"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Tor 0.4.7.x before 0.4.7.8 allows a denial of service via the wedging of RTT estimation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-03T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://lists.torproject.org/pipermail/tor-announce/2022-June/000242.html"
        },
        {
          "url": "https://security-tracker.debian.org/tracker/CVE-2022-33903"
        },
        {
          "name": "GLSA-202305-11",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.gentoo.org/glsa/202305-11"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-33903",
    "datePublished": "2022-07-17T00:00:00",
    "dateReserved": "2022-06-17T00:00:00",
    "dateUpdated": "2024-08-03T08:09:22.727Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-46702 (GCVE-0-2021-46702)

Vulnerability from cvelistv5 – Published: 2022-02-26 02:56 – Updated: 2024-08-04 05:17
VLAI?
Summary
Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclosure. This could allow local attackers to bypass the intended anonymity feature and obtain information regarding the onion services visited by a local user. This can be accomplished by analyzing RAM memory even several hours after the local user used the product. This occurs because the product doesn't properly free memory.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:17:42.618Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.sciencedirect.com/science/article/pii/S0167404821001358"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclosure. This could allow local attackers to bypass the intended anonymity feature and obtain information regarding the onion services visited by a local user. This can be accomplished by analyzing RAM memory even several hours after the local user used the product. This occurs because the product doesn\u0027t properly free memory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-26T02:56:26",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.sciencedirect.com/science/article/pii/S0167404821001358"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-46702",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclosure. This could allow local attackers to bypass the intended anonymity feature and obtain information regarding the onion services visited by a local user. This can be accomplished by analyzing RAM memory even several hours after the local user used the product. This occurs because the product doesn\u0027t properly free memory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.sciencedirect.com/science/article/pii/S0167404821001358",
              "refsource": "MISC",
              "url": "https://www.sciencedirect.com/science/article/pii/S0167404821001358"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-46702",
    "datePublished": "2022-02-26T02:56:26",
    "dateReserved": "2022-02-26T00:00:00",
    "dateUpdated": "2024-08-04T05:17:42.618Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-38385 (GCVE-0-2021-38385)

Vulnerability from cvelistv5 – Published: 2021-08-30 00:00 – Updated: 2024-08-04 01:37
VLAI?
Summary
Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship between batch-signature verification and single-signature verification, leading to a remote assertion failure, aka TROVE-2021-007.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T01:37:16.635Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://blog.torproject.org"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://blog.torproject.org/node/2062"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugs.torproject.org/tpo/core/tor/40078"
          },
          {
            "name": "GLSA-202305-11",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202305-11"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship between batch-signature verification and single-signature verification, leading to a remote assertion failure, aka TROVE-2021-007."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-03T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://blog.torproject.org"
        },
        {
          "url": "https://blog.torproject.org/node/2062"
        },
        {
          "url": "https://bugs.torproject.org/tpo/core/tor/40078"
        },
        {
          "name": "GLSA-202305-11",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.gentoo.org/glsa/202305-11"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-38385",
    "datePublished": "2021-08-30T00:00:00",
    "dateReserved": "2021-08-10T00:00:00",
    "dateUpdated": "2024-08-04T01:37:16.635Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-34550 (GCVE-0-2021-34550)

Vulnerability from cvelistv5 – Published: 2021-06-29 11:11 – Updated: 2024-08-04 00:12
VLAI?
Summary
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006. The v3 onion service descriptor parsing allows out-of-bounds memory access, and a client crash, via a crafted onion service descriptor
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:12:50.393Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40392"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://blog.torproject.org/node/2041"
          },
          {
            "name": "GLSA-202107-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202107-25"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006. The v3 onion service descriptor parsing allows out-of-bounds memory access, and a client crash, via a crafted onion service descriptor"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-10T04:06:18",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40392"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://blog.torproject.org/node/2041"
        },
        {
          "name": "GLSA-202107-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202107-25"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-34550",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006. The v3 onion service descriptor parsing allows out-of-bounds memory access, and a client crash, via a crafted onion service descriptor"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40392",
              "refsource": "MISC",
              "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40392"
            },
            {
              "name": "https://blog.torproject.org/node/2041",
              "refsource": "CONFIRM",
              "url": "https://blog.torproject.org/node/2041"
            },
            {
              "name": "GLSA-202107-25",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202107-25"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-34550",
    "datePublished": "2021-06-29T11:11:45",
    "dateReserved": "2021-06-10T00:00:00",
    "dateUpdated": "2024-08-04T00:12:50.393Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-34549 (GCVE-0-2021-34549)

Vulnerability from cvelistv5 – Published: 2021-06-29 11:08 – Updated: 2024-08-04 00:12
VLAI?
Summary
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:12:50.424Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40391"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://blog.torproject.org/node/2041"
          },
          {
            "name": "GLSA-202107-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202107-25"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-10T04:06:20",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40391"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://blog.torproject.org/node/2041"
        },
        {
          "name": "GLSA-202107-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202107-25"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-34549",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40391",
              "refsource": "MISC",
              "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40391"
            },
            {
              "name": "https://blog.torproject.org/node/2041",
              "refsource": "CONFIRM",
              "url": "https://blog.torproject.org/node/2041"
            },
            {
              "name": "GLSA-202107-25",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202107-25"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-34549",
    "datePublished": "2021-06-29T11:08:22",
    "dateReserved": "2021-06-10T00:00:00",
    "dateUpdated": "2024-08-04T00:12:50.424Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-34548 (GCVE-0-2021-34548)

Vulnerability from cvelistv5 – Published: 2021-06-29 11:00 – Updated: 2024-08-04 00:12
VLAI?
Summary
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:12:50.422Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40389"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://blog.torproject.org/node/2041"
          },
          {
            "name": "GLSA-202107-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202107-25"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/163510/Tor-Half-Closed-Connection-Stream-Confusion.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-15T15:06:13",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40389"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://blog.torproject.org/node/2041"
        },
        {
          "name": "GLSA-202107-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202107-25"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/163510/Tor-Half-Closed-Connection-Stream-Confusion.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-34548",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40389",
              "refsource": "MISC",
              "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40389"
            },
            {
              "name": "https://blog.torproject.org/node/2041",
              "refsource": "CONFIRM",
              "url": "https://blog.torproject.org/node/2041"
            },
            {
              "name": "GLSA-202107-25",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202107-25"
            },
            {
              "name": "http://packetstormsecurity.com/files/163510/Tor-Half-Closed-Connection-Stream-Confusion.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/163510/Tor-Half-Closed-Connection-Stream-Confusion.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-34548",
    "datePublished": "2021-06-29T11:00:16",
    "dateReserved": "2021-06-10T00:00:00",
    "dateUpdated": "2024-08-04T00:12:50.422Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-28090 (GCVE-0-2021-28090)

Vulnerability from cvelistv5 – Published: 2021-03-19 04:19 – Updated: 2024-08-03 21:33
VLAI?
Summary
Tor before 0.4.5.7 allows a remote attacker to cause Tor directory authorities to exit with an assertion failure, aka TROVE-2021-002.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T21:33:17.495Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40316"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://blog.torproject.org/node/2009"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugs.torproject.org/tpo/core/tor/40316"
          },
          {
            "name": "FEDORA-2021-e68317166d",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HPDXB2GZHG3VNOTWSXQ3QZVHNV76WCU5/"
          },
          {
            "name": "GLSA-202107-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202107-25"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Tor before 0.4.5.7 allows a remote attacker to cause Tor directory authorities to exit with an assertion failure, aka TROVE-2021-002."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-10T04:06:15",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40316"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://blog.torproject.org/node/2009"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugs.torproject.org/tpo/core/tor/40316"
        },
        {
          "name": "FEDORA-2021-e68317166d",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HPDXB2GZHG3VNOTWSXQ3QZVHNV76WCU5/"
        },
        {
          "name": "GLSA-202107-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202107-25"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-28090",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Tor before 0.4.5.7 allows a remote attacker to cause Tor directory authorities to exit with an assertion failure, aka TROVE-2021-002."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40316",
              "refsource": "MISC",
              "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40316"
            },
            {
              "name": "https://blog.torproject.org/node/2009",
              "refsource": "CONFIRM",
              "url": "https://blog.torproject.org/node/2009"
            },
            {
              "name": "https://bugs.torproject.org/tpo/core/tor/40316",
              "refsource": "CONFIRM",
              "url": "https://bugs.torproject.org/tpo/core/tor/40316"
            },
            {
              "name": "FEDORA-2021-e68317166d",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HPDXB2GZHG3VNOTWSXQ3QZVHNV76WCU5/"
            },
            {
              "name": "GLSA-202107-25",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202107-25"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-28090",
    "datePublished": "2021-03-19T04:19:06",
    "dateReserved": "2021-03-08T00:00:00",
    "dateUpdated": "2024-08-03T21:33:17.495Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-23589 (GCVE-0-2023-23589)

Vulnerability from nvd – Published: 2023-01-14 00:00 – Updated: 2025-04-07 18:14
VLAI?
Summary
The SafeSocks option in Tor before 0.4.7.13 has a logic error in which the unsafe SOCKS4 protocol can be used but not the safe SOCKS4a protocol, aka TROVE-2022-002.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:35:33.384Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.7/ReleaseNotes"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40730"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.torproject.org/tpo/core/tor/-/commit/a282145b3634547ab84ccd959d0537c021ff7ffc"
          },
          {
            "name": "DSA-5320",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5320"
          },
          {
            "name": "FEDORA-2023-c290171664",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMY4FWXYKP3MDXTZ3EJ7XJVGBCKBK2XL/"
          },
          {
            "name": "FEDORA-2023-1254a1fc28",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IYOLTP6HQO2HPXUYKOR7P5YYYN7CINQQ/"
          },
          {
            "name": "[debian-lts-announce] 20230128 [SECURITY] [DLA 3286-1] tor security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00026.html"
          },
          {
            "name": "GLSA-202305-11",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202305-11"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-23589",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-07T18:13:18.347462Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-693",
                "description": "CWE-693 Protection Mechanism Failure",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-07T18:14:11.104Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The SafeSocks option in Tor before 0.4.7.13 has a logic error in which the unsafe SOCKS4 protocol can be used but not the safe SOCKS4a protocol, aka TROVE-2022-002."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-03T00:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.7/ReleaseNotes"
        },
        {
          "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40730"
        },
        {
          "url": "https://gitlab.torproject.org/tpo/core/tor/-/commit/a282145b3634547ab84ccd959d0537c021ff7ffc"
        },
        {
          "name": "DSA-5320",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.debian.org/security/2023/dsa-5320"
        },
        {
          "name": "FEDORA-2023-c290171664",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMY4FWXYKP3MDXTZ3EJ7XJVGBCKBK2XL/"
        },
        {
          "name": "FEDORA-2023-1254a1fc28",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IYOLTP6HQO2HPXUYKOR7P5YYYN7CINQQ/"
        },
        {
          "name": "[debian-lts-announce] 20230128 [SECURITY] [DLA 3286-1] tor security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00026.html"
        },
        {
          "name": "GLSA-202305-11",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.gentoo.org/glsa/202305-11"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-23589",
    "datePublished": "2023-01-14T00:00:00.000Z",
    "dateReserved": "2023-01-14T00:00:00.000Z",
    "dateUpdated": "2025-04-07T18:14:11.104Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-33903 (GCVE-0-2022-33903)

Vulnerability from nvd – Published: 2022-07-17 00:00 – Updated: 2024-08-03 08:09
VLAI?
Summary
Tor 0.4.7.x before 0.4.7.8 allows a denial of service via the wedging of RTT estimation.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T08:09:22.727Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.torproject.org/pipermail/tor-announce/2022-June/000242.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security-tracker.debian.org/tracker/CVE-2022-33903"
          },
          {
            "name": "GLSA-202305-11",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202305-11"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Tor 0.4.7.x before 0.4.7.8 allows a denial of service via the wedging of RTT estimation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-03T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://lists.torproject.org/pipermail/tor-announce/2022-June/000242.html"
        },
        {
          "url": "https://security-tracker.debian.org/tracker/CVE-2022-33903"
        },
        {
          "name": "GLSA-202305-11",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.gentoo.org/glsa/202305-11"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-33903",
    "datePublished": "2022-07-17T00:00:00",
    "dateReserved": "2022-06-17T00:00:00",
    "dateUpdated": "2024-08-03T08:09:22.727Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-46702 (GCVE-0-2021-46702)

Vulnerability from nvd – Published: 2022-02-26 02:56 – Updated: 2024-08-04 05:17
VLAI?
Summary
Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclosure. This could allow local attackers to bypass the intended anonymity feature and obtain information regarding the onion services visited by a local user. This can be accomplished by analyzing RAM memory even several hours after the local user used the product. This occurs because the product doesn't properly free memory.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:17:42.618Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.sciencedirect.com/science/article/pii/S0167404821001358"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclosure. This could allow local attackers to bypass the intended anonymity feature and obtain information regarding the onion services visited by a local user. This can be accomplished by analyzing RAM memory even several hours after the local user used the product. This occurs because the product doesn\u0027t properly free memory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-26T02:56:26",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.sciencedirect.com/science/article/pii/S0167404821001358"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-46702",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclosure. This could allow local attackers to bypass the intended anonymity feature and obtain information regarding the onion services visited by a local user. This can be accomplished by analyzing RAM memory even several hours after the local user used the product. This occurs because the product doesn\u0027t properly free memory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.sciencedirect.com/science/article/pii/S0167404821001358",
              "refsource": "MISC",
              "url": "https://www.sciencedirect.com/science/article/pii/S0167404821001358"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-46702",
    "datePublished": "2022-02-26T02:56:26",
    "dateReserved": "2022-02-26T00:00:00",
    "dateUpdated": "2024-08-04T05:17:42.618Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-38385 (GCVE-0-2021-38385)

Vulnerability from nvd – Published: 2021-08-30 00:00 – Updated: 2024-08-04 01:37
VLAI?
Summary
Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship between batch-signature verification and single-signature verification, leading to a remote assertion failure, aka TROVE-2021-007.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T01:37:16.635Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://blog.torproject.org"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://blog.torproject.org/node/2062"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugs.torproject.org/tpo/core/tor/40078"
          },
          {
            "name": "GLSA-202305-11",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202305-11"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship between batch-signature verification and single-signature verification, leading to a remote assertion failure, aka TROVE-2021-007."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-03T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://blog.torproject.org"
        },
        {
          "url": "https://blog.torproject.org/node/2062"
        },
        {
          "url": "https://bugs.torproject.org/tpo/core/tor/40078"
        },
        {
          "name": "GLSA-202305-11",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.gentoo.org/glsa/202305-11"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-38385",
    "datePublished": "2021-08-30T00:00:00",
    "dateReserved": "2021-08-10T00:00:00",
    "dateUpdated": "2024-08-04T01:37:16.635Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-34550 (GCVE-0-2021-34550)

Vulnerability from nvd – Published: 2021-06-29 11:11 – Updated: 2024-08-04 00:12
VLAI?
Summary
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006. The v3 onion service descriptor parsing allows out-of-bounds memory access, and a client crash, via a crafted onion service descriptor
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:12:50.393Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40392"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://blog.torproject.org/node/2041"
          },
          {
            "name": "GLSA-202107-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202107-25"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006. The v3 onion service descriptor parsing allows out-of-bounds memory access, and a client crash, via a crafted onion service descriptor"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-10T04:06:18",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40392"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://blog.torproject.org/node/2041"
        },
        {
          "name": "GLSA-202107-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202107-25"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-34550",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006. The v3 onion service descriptor parsing allows out-of-bounds memory access, and a client crash, via a crafted onion service descriptor"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40392",
              "refsource": "MISC",
              "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40392"
            },
            {
              "name": "https://blog.torproject.org/node/2041",
              "refsource": "CONFIRM",
              "url": "https://blog.torproject.org/node/2041"
            },
            {
              "name": "GLSA-202107-25",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202107-25"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-34550",
    "datePublished": "2021-06-29T11:11:45",
    "dateReserved": "2021-06-10T00:00:00",
    "dateUpdated": "2024-08-04T00:12:50.393Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-34549 (GCVE-0-2021-34549)

Vulnerability from nvd – Published: 2021-06-29 11:08 – Updated: 2024-08-04 00:12
VLAI?
Summary
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:12:50.424Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40391"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://blog.torproject.org/node/2041"
          },
          {
            "name": "GLSA-202107-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202107-25"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-10T04:06:20",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40391"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://blog.torproject.org/node/2041"
        },
        {
          "name": "GLSA-202107-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202107-25"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-34549",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40391",
              "refsource": "MISC",
              "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40391"
            },
            {
              "name": "https://blog.torproject.org/node/2041",
              "refsource": "CONFIRM",
              "url": "https://blog.torproject.org/node/2041"
            },
            {
              "name": "GLSA-202107-25",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202107-25"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-34549",
    "datePublished": "2021-06-29T11:08:22",
    "dateReserved": "2021-06-10T00:00:00",
    "dateUpdated": "2024-08-04T00:12:50.424Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-34548 (GCVE-0-2021-34548)

Vulnerability from nvd – Published: 2021-06-29 11:00 – Updated: 2024-08-04 00:12
VLAI?
Summary
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:12:50.422Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40389"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://blog.torproject.org/node/2041"
          },
          {
            "name": "GLSA-202107-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202107-25"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/163510/Tor-Half-Closed-Connection-Stream-Confusion.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-15T15:06:13",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40389"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://blog.torproject.org/node/2041"
        },
        {
          "name": "GLSA-202107-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202107-25"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/163510/Tor-Half-Closed-Connection-Stream-Confusion.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-34548",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40389",
              "refsource": "MISC",
              "url": "https://gitlab.torproject.org/tpo/core/tor/-/issues/40389"
            },
            {
              "name": "https://blog.torproject.org/node/2041",
              "refsource": "CONFIRM",
              "url": "https://blog.torproject.org/node/2041"
            },
            {
              "name": "GLSA-202107-25",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202107-25"
            },
            {
              "name": "http://packetstormsecurity.com/files/163510/Tor-Half-Closed-Connection-Stream-Confusion.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/163510/Tor-Half-Closed-Connection-Stream-Confusion.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-34548",
    "datePublished": "2021-06-29T11:00:16",
    "dateReserved": "2021-06-10T00:00:00",
    "dateUpdated": "2024-08-04T00:12:50.422Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}