Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2006-3411

Опубликовано: 07 июл. 2006
Источник: nvd
CVSS2: 6.4
EPSS Низкий

Описание

TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*

EPSS

Процентиль: 49%
0.00257
Низкий

6.4 Medium

CVSS2

Дефекты

NVD-CWE-Other

Связанные уязвимости

ubuntu
около 19 лет назад

TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys.

debian
около 19 лет назад

TLS handshakes in Tor before 0.1.1.20 generate public-private keys bas ...

github
больше 3 лет назад

TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys.

EPSS

Процентиль: 49%
0.00257
Низкий

6.4 Medium

CVSS2

Дефекты

NVD-CWE-Other