Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-25022

Опубликовано: 13 дек. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3
CVSS3: 3.1

Описание

The Onion module in toxcore before 0.2.2 doesn't restrict which packets can be onion-routed, which allows a remote attacker to discover a target user's IP address (when knowing only their Tox Id) by positioning themselves close to target's Tox Id in the DHT for the target to establish an onion connection with the attacker, guessing the target's DHT public key and creating a DHT node with public key close to it, and finally onion-routing a NAT Ping Request to the target, requesting it to ping the just created DHT node.

РелизСтатусПримечание
bionic

DNE

devel

not-affected

esm-apps/focal

not-affected

0.2.10-1build2
esm-apps/jammy

not-affected

focal

not-affected

0.2.10-1build2
impish

not-affected

jammy

not-affected

trusty

DNE

upstream

needs-triage

xenial

DNE

Показывать по

EPSS

Процентиль: 53%
0.00297
Низкий

4.3 Medium

CVSS2

3.1 Low

CVSS3

Связанные уязвимости

CVSS3: 3.1
nvd
около 4 лет назад

The Onion module in toxcore before 0.2.2 doesn't restrict which packets can be onion-routed, which allows a remote attacker to discover a target user's IP address (when knowing only their Tox Id) by positioning themselves close to target's Tox Id in the DHT for the target to establish an onion connection with the attacker, guessing the target's DHT public key and creating a DHT node with public key close to it, and finally onion-routing a NAT Ping Request to the target, requesting it to ping the just created DHT node.

CVSS3: 3.1
debian
около 4 лет назад

The Onion module in toxcore before 0.2.2 doesn't restrict which packet ...

github
около 4 лет назад

The Onion module in toxcore before 0.2.2 doesn't restrict which packets can be onion-routed, which allows a remote attacker to discover a target user's IP address (when knowing only their Tox Id) by positioning themselves close to target's Tox Id in the DHT for the target to establish an onion connection with the attacker, guessing the target's DHT public key and creating a DHT node with public key close to it, and finally onion-routing a NAT Ping Request to the target, requesting it to ping the just created DHT node.

EPSS

Процентиль: 53%
0.00297
Низкий

4.3 Medium

CVSS2

3.1 Low

CVSS3