CVE Vulnerabilities

CVE-2005-2643

Published: Aug 23, 2005 | Modified: Apr 03, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit.

Affected Software

NameVendorStart VersionEnd Version
TorTor0.0.9 (including)0.0.9 (including)
TorTor0.0.9.1 (including)0.0.9.1 (including)
TorTor0.0.9.2 (including)0.0.9.2 (including)
TorTor0.0.9.3 (including)0.0.9.3 (including)
TorTor0.0.9.4 (including)0.0.9.4 (including)
TorTor0.0.9.5 (including)0.0.9.5 (including)
TorTor0.0.9.6 (including)0.0.9.6 (including)
TorTor0.0.9.7 (including)0.0.9.7 (including)
TorTor0.0.9.8 (including)0.0.9.8 (including)
TorTor0.0.9.9 (including)0.0.9.9 (including)
TorTor0.1.0.1 (including)0.1.0.1 (including)
TorTor0.1.0.2 (including)0.1.0.2 (including)
TorTor0.1.0.3 (including)0.1.0.3 (including)
TorTor0.1.0.4 (including)0.1.0.4 (including)
TorTor0.1.0.5 (including)0.1.0.5 (including)
TorTor0.1.0.6 (including)0.1.0.6 (including)
TorTor0.1.0.7 (including)0.1.0.7 (including)
TorTor0.1.0.8 (including)0.1.0.8 (including)
TorTor0.1.0.9 (including)0.1.0.9 (including)
TorTor0.1.0.10 (including)0.1.0.10 (including)
TorTor0.1.0.11 (including)0.1.0.11 (including)
TorTor0.1.0.12 (including)0.1.0.12 (including)
TorTor0.1.0.13 (including)0.1.0.13 (including)
TorTor0.1.1.1_alpha (including)0.1.1.1_alpha (including)
TorTor0.1.1.2_alpha (including)0.1.1.2_alpha (including)
TorTor0.1.1.3_alpha (including)0.1.1.3_alpha (including)
TorTor0.1.1.4_alpha (including)0.1.1.4_alpha (including)
TorUbuntudevel*

References