Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tor | Tor | 0.0.9 (including) | 0.0.9 (including) |
Tor | Tor | 0.0.9.1 (including) | 0.0.9.1 (including) |
Tor | Tor | 0.0.9.2 (including) | 0.0.9.2 (including) |
Tor | Tor | 0.0.9.3 (including) | 0.0.9.3 (including) |
Tor | Tor | 0.0.9.4 (including) | 0.0.9.4 (including) |
Tor | Tor | 0.0.9.5 (including) | 0.0.9.5 (including) |
Tor | Tor | 0.0.9.6 (including) | 0.0.9.6 (including) |
Tor | Tor | 0.0.9.7 (including) | 0.0.9.7 (including) |
Tor | Tor | 0.0.9.8 (including) | 0.0.9.8 (including) |
Tor | Tor | 0.0.9.9 (including) | 0.0.9.9 (including) |
Tor | Tor | 0.1.0.1 (including) | 0.1.0.1 (including) |
Tor | Tor | 0.1.0.2 (including) | 0.1.0.2 (including) |
Tor | Tor | 0.1.0.3 (including) | 0.1.0.3 (including) |
Tor | Tor | 0.1.0.4 (including) | 0.1.0.4 (including) |
Tor | Tor | 0.1.0.5 (including) | 0.1.0.5 (including) |
Tor | Tor | 0.1.0.6 (including) | 0.1.0.6 (including) |
Tor | Tor | 0.1.0.7 (including) | 0.1.0.7 (including) |
Tor | Tor | 0.1.0.8 (including) | 0.1.0.8 (including) |
Tor | Tor | 0.1.0.9 (including) | 0.1.0.9 (including) |
Tor | Tor | 0.1.0.10 (including) | 0.1.0.10 (including) |
Tor | Tor | 0.1.0.11 (including) | 0.1.0.11 (including) |
Tor | Tor | 0.1.0.12 (including) | 0.1.0.12 (including) |
Tor | Tor | 0.1.0.13 (including) | 0.1.0.13 (including) |
Tor | Tor | 0.1.1.1_alpha (including) | 0.1.1.1_alpha (including) |
Tor | Tor | 0.1.1.2_alpha (including) | 0.1.1.2_alpha (including) |
Tor | Tor | 0.1.1.3_alpha (including) | 0.1.1.3_alpha (including) |
Tor | Tor | 0.1.1.4_alpha (including) | 0.1.1.4_alpha (including) |
Tor | Ubuntu | devel | * |