CVE-2009-0654 Affecting tor package, versions [,0.2.0.35)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.92% (83rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-TOR-2371358
  • published26 Jan 2022
  • disclosed20 Feb 2009
  • creditUnknown

Introduced: 20 Feb 2009

CVE-2009-0654  (opens in a new tab)

How to fix?

Upgrade tor to version 0.2.0.35 or higher.

Overview

Tor 0.2.0.28, and probably 0.2.0.34 and earlier, allows remote attackers, with control of an entry router and an exit router, to confirm that a sender and receiver are communicating via vectors involving (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, and then observing cell recognition errors at the exit router. NOTE: the vendor disputes the significance of this issue, noting that the product's design "accepted end-to-end correlation as an attack that is too expensive to solve."

References

CVSS Scores

version 3.1