Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-5117

Опубликовано: 30 июл. 2014
Источник: ubuntu
Приоритет: medium
CVSS2: 5.8

Описание

Tor before 0.2.4.23 and 0.2.5 before 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote attackers to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a means of communicating information about hidden service names.

РелизСтатусПримечание
devel

not-affected

0.2.6.10-1
esm-apps/xenial

not-affected

0.2.6.10-1
esm-infra-legacy/trusty

released

0.2.4.27-1build0.14.04.1
lucid

DNE

precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

released

0.2.4.27-1build0.14.04.1
trusty/esm

released

0.2.4.27-1build0.14.04.1
upstream

released

0.2.4.23-1
utopic

ignored

end of life

Показывать по

5.8 Medium

CVSS2

Связанные уязвимости

nvd
больше 11 лет назад

Tor before 0.2.4.23 and 0.2.5 before 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote attackers to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a means of communicating information about hidden service names.

debian
больше 11 лет назад

Tor before 0.2.4.23 and 0.2.5 before 0.2.5.6-alpha maintains a circuit ...

github
больше 3 лет назад

Tor before 0.2.4.23 and 0.2.5 before 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote attackers to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a means of communicating information about hidden service names.

fstec
больше 11 лет назад

Уязвимость программного обеспечения Tor, позволяющая удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации

5.8 Medium

CVSS2