CVE-2006-3411 Affecting tor package, versions [,0.1.1.20)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.63% (80th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-TOR-2371389
  • published26 Jan 2022
  • disclosed7 Jul 2006
  • creditUnknown

Introduced: 7 Jul 2006

CVE-2006-3411  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade tor to version 0.1.1.20 or higher.

Overview

TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys.

References

CVSS Scores

version 3.1