Описание
TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys.
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | DNE | |
edgy | released | 0.1.1.20-1 |
feisty | released | 0.1.1.20-1 |
gutsy | released | 0.1.1.20-1 |
hardy | released | 0.1.1.20-1 |
intrepid | released | 0.1.1.20-1 |
jaunty | DNE | |
karmic | DNE | |
upstream | released | 0.1.1.20 |
Показывать по
Ссылки на источники
EPSS
6.4 Medium
CVSS2
Связанные уязвимости
TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys.
TLS handshakes in Tor before 0.1.1.20 generate public-private keys bas ...
TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys.
EPSS
6.4 Medium
CVSS2