An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream.
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tor | Torproject | * | 0.3.5.15 (excluding) |
Tor | Torproject | 0.4.0.0 (including) | 0.4.4.9 (excluding) |
Tor | Torproject | 0.4.5.0 (including) | 0.4.5.9 (excluding) |
Tor | Torproject | 0.4.6.0 (including) | 0.4.6.5 (excluding) |
Tor | Ubuntu | esm-apps/focal | * |
Tor | Ubuntu | focal | * |
Tor | Ubuntu | groovy | * |
Tor | Ubuntu | hirsute | * |
Tor | Ubuntu | impish | * |
Tor | Ubuntu | trusty | * |
Tor | Ubuntu | upstream | * |
Tor | Ubuntu | xenial | * |