FKIE_CVE-2009-0654
Vulnerability from fkie_nvd - Published: 2009-02-20 19:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Tor 0.2.0.28, and probably 0.2.0.34 and earlier, allows remote attackers, with control of an entry router and an exit router, to confirm that a sender and receiver are communicating via vectors involving (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, and then observing cell recognition errors at the exit router. NOTE: the vendor disputes the significance of this issue, noting that the product's design "accepted end-to-end correlation as an attack that is too expensive to solve."
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| tor | tor | * | |
| tor | tor | 0.2.0.1 | |
| tor | tor | 0.2.0.2 | |
| tor | tor | 0.2.0.3 | |
| tor | tor | 0.2.0.4 | |
| tor | tor | 0.2.0.5 | |
| tor | tor | 0.2.0.6 | |
| tor | tor | 0.2.0.7 | |
| tor | tor | 0.2.0.8 | |
| tor | tor | 0.2.0.9 | |
| tor | tor | 0.2.0.10 | |
| tor | tor | 0.2.0.11 | |
| tor | tor | 0.2.0.12 | |
| tor | tor | 0.2.0.13 | |
| tor | tor | 0.2.0.14 | |
| tor | tor | 0.2.0.15 | |
| tor | tor | 0.2.0.16 | |
| tor | tor | 0.2.0.17 | |
| tor | tor | 0.2.0.18 | |
| tor | tor | 0.2.0.19 | |
| tor | tor | 0.2.0.20 | |
| tor | tor | 0.2.0.21 | |
| tor | tor | 0.2.0.22 | |
| tor | tor | 0.2.0.23 | |
| tor | tor | 0.2.0.24 | |
| tor | tor | 0.2.0.25 | |
| tor | tor | 0.2.0.26 | |
| tor | tor | 0.2.0.27 | |
| tor | tor | 0.2.0.28 | |
| tor | tor | 0.2.0.29 | |
| tor | tor | 0.2.0.30 | |
| tor | tor | 0.2.0.31 | |
| tor | tor | 0.2.0.32 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tor:tor:*:alpha:*:*:*:*:*:*",
"matchCriteriaId": "95A5691B-621A-4B7D-8F83-2C95DF30EF60",
"versionEndIncluding": "0.2.0.34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*",
"matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*",
"matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*",
"matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*",
"matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*",
"matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*",
"matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*",
"matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*",
"matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*",
"matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*",
"matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*",
"matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*",
"matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*",
"matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*",
"matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*",
"matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*",
"matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*",
"matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*",
"matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*",
"matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*",
"matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*",
"matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*",
"matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*",
"matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*",
"matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*",
"matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*",
"matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*",
"matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*",
"matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*",
"matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*",
"matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*",
"matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*",
"matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tor 0.2.0.28, and probably 0.2.0.34 and earlier, allows remote attackers, with control of an entry router and an exit router, to confirm that a sender and receiver are communicating via vectors involving (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, and then observing cell recognition errors at the exit router. NOTE: the vendor disputes the significance of this issue, noting that the product\u0027s design \"accepted end-to-end correlation as an attack that is too expensive to solve.\""
},
{
"lang": "es",
"value": "Tor v0.2.0.28, y posiblemente v0.2.0.34 y anteriores, permite a atacantes remotos, con el control de un enrutador de salida y otro de entrada, confirmar que un receptor y un remitente estan comunicandose a traves de los vectores (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, y despues observar los errores de reconocimiento de celula en el enrutador de salida. NOTA: El vendedor no esta de acuerda con la importancia de este hecho."
}
],
"id": "CVE-2009-0654",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-02-20T19:30:00.313",
"references": [
{
"source": "cve@mitre.org",
"url": "http://blog.torproject.org/blog/one-cell-enough"
},
{
"source": "cve@mitre.org",
"url": "http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Fu"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://blog.torproject.org/blog/one-cell-enough"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Fu"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…