Tor 0.1.0.13 and previous versions, and experimental versions 0.1.1.4-alpha and previous versions, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
tor tor 0.0.9.1 |
||
tor tor 0.0.9.2 |
||
tor tor 0.0.9.9 |
||
tor tor 0.1.0.1 |
||
tor tor 0.1.0.4 |
||
tor tor 0.1.0.5 |
||
tor tor 0.0.9.3 |
||
tor tor 0.0.9.4 |
||
tor tor 0.1.0.10 |
||
tor tor 0.1.0.11 |
||
tor tor 0.1.0.6 |
||
tor tor 0.1.0.7 |
||
tor tor 0.0.9.5 |
||
tor tor 0.0.9.6 |
||
tor tor 0.1.0.12 |
||
tor tor 0.1.0.13 |
||
tor tor 0.1.0.8 |
||
tor tor 0.1.0.9 |
||
tor tor 0.1.1.1_alpha |
||
tor tor 0.1.1.4_alpha |
||
tor tor 0.0.9 |
||
tor tor 0.0.9.7 |
||
tor tor 0.0.9.8 |
||
tor tor 0.1.0.2 |
||
tor tor 0.1.0.3 |
||
tor tor 0.1.1.2_alpha |
||
tor tor 0.1.1.3_alpha |