ID

VAR-201112-0312


CVE

CVE-2011-2769


TITLE

Tor Enumerated bridge vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2011-003513

DESCRIPTION

Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values. Tor (The Onion Router) is an implementation of the second generation of onion routing, which allows users to communicate anonymously over the Internet. Tor has security holes in its implementation that can be exploited by malicious users to disclose sensitive information. This vulnerability is caused by the client reusing a TLS certificate on some connections. Simulate a user's detection of multiple protection relays by using a user certificate identification key to determine the connection status of the user. Tor is prone to a remote information-disclosure vulnerability and a bridge enumeration weakness. Exploits will allow attackers to obtain sensitive information that can help them launch further attacks. Versions prior to Tor 0.2.2.34 are vulnerable. ---------------------------------------------------------------------- Ovum says ad hoc tools are out-dated. The best practice approach? Fast vulnerability intelligence, threat handling, and setup in one tool. Read the new report on the Secunia VIM: http://secunia.com/products/corporate/vim/ovum_2011_request/ ---------------------------------------------------------------------- TITLE: Tor TLS Certificate Reuse User De-Anonymisation Security Issue SECUNIA ADVISORY ID: SA46634 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46634/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46634 RELEASE DATE: 2011-10-28 DISCUSS ADVISORY: http://secunia.com/advisories/46634/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/46634/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=46634 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A security issue has been reported in Tor, which can be exploited by malicious people to disclose potentially sensitive information. This can be exploited to e.g. fingerprint and de-anonymise a user by e.g. Note: Additionally, enhancement have been made to protect against bridge enumeration attacks. SOLUTION: Update to version 0.2.2.34. PROVIDED AND/OR DISCOVERED BY: The vendor credits frosty_un. ORIGINAL ADVISORY: https://blog.torproject.org/blog/tor-02234-released-security-patches OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests (CVE-2012-3517). The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted (1) vote document or (2) consensus document (CVE-2012-3518). routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack (CVE-2012-3519). The compare_tor_addr_to_addr_policy function in or/policies.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.21-rc, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a zero-valued port field that is not properly handled during policy comparison (CVE-2012-4419). Tor before 0.2.2.39, when waiting for a client to renegotiate, allowed it to add bytes to the input buffer, allowing a crash to be caused remotely (tor-5934, tor-6007). Denial of Service vulnerability in Tor before 0.2.3.25, due to an error when handling SENDME cells and can be exploited to cause excessive consumption of memory resources within an entry node (SA51329, CVE-2012-5573). The version of Tor shipped in MBS1 did not have correctly formed systemd unit and thus failed to start. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2768 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2769 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3517 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3518 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3519 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4419 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5573 https://wiki.mageia.org/en/Support/Advisories/MGAA-2012-0184 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0276 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0356 _______________________________________________________________________ Updated Packages: Mandriva Business Server 1/X86_64: 8cadc920e4452cd2a3551a3cb01d9fcf mbs1/x86_64/tor-0.2.2.39-1.mbs1.x86_64.rpm 7cbba7170bc4f9e6ee8409398437570c mbs1/SRPMS/tor-0.2.2.39-1.mbs1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA-2331-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff October 28, 2011 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : tor Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2011-2768 CVE-2011-2769 It has been discovered by "frosty_un" that a design flaw in Tor, an online privacy tool, allows malicious relay servers to learn certain information that they should not be able to learn. In combination with other attacks, this issue can lead to deanonymizing the user. The Common Vulnerabilities and Exposures project has assigned CVE-2011-2768 to this issue. In addition to fixing the above mentioned issues, the updates to oldstable and stable fix a number of less critical issues (CVE-2011-2769). Please see this posting from the Tor blog for more information: https://blog.torproject.org/blog/tor-02234-released-security-patches For the oldstable distribution (lenny), this problem has been fixed in version 0.2.1.31-1~lenny+1. Due to technical limitations in the Debian archive scripts, the update cannot be released synchronously with the packages for stable. It will be released shortly. For the stable distribution (squeeze), this problem has been fixed in version 0.2.1.31-1. For the unstable and testing distributions, this problem has been fixed in version 0.2.2.34-1. For the experimental distribution, this problem have has fixed in version 0.2.3.6-alpha-1. We recommend that you upgrade your tor packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iEYEARECAAYFAk6q1UIACgkQXm3vHE4uylrH1ACg6Y7x6by9MtC6d2whbYQvf0sV qdgAoM3IeWEe985DCPmvdBDHmEQBDzpk =HWr2 -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201201-12 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Tor: Multiple vulnerabilities Date: January 23, 2012 Bugs: #388769, #394969 ID: 201201-12 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Tor, the most severe of which may allow a remote attacker to execute arbitrary code. * When configured as a bridge, Tor relays can distinguish incoming bridge connections from client connections (CVE-2011-2769). * An error in or/buffers.c could result in a heap-based buffer overflow (CVE-2011-2778). Impact ====== A remote attacker could possibly execute arbitrary code or cause a Denial of Service. Workaround ========== There is no known workaround at this time. Resolution ========== All Tor users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.2.35" References ========== [ 1 ] CVE-2011-2768 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2768 [ 2 ] CVE-2011-2769 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2769 [ 3 ] CVE-2011-2778 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2778 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201201-12.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.88

sources: NVD: CVE-2011-2769 // JVNDB: JVNDB-2011-003513 // CNVD: CNVD-2011-5558 // BID: 50414 // PACKETSTORM: 106334 // PACKETSTORM: 106460 // PACKETSTORM: 121258 // PACKETSTORM: 106343 // PACKETSTORM: 108997

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2011-5558

AFFECTED PRODUCTS

vendor:tormodel:torscope:eqversion:0.1.1.20

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.0.14

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.0.13

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.0.12

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.0.11

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.0.10

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.9

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.8

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.7

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.6

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.5

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.4

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.3

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.2

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.10

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.1

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.2.1.21

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.2.1.20

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.2.16

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.2.15

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.0.17

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.20

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.28

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.9

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.18

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.18

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.19

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.5

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.4

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.25

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.13

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.9

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.3

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.17

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.3

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.4

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.16

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.9

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.4

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.13

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.8

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.23

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.17

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.13

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.7

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.14

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.5

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.8

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.24

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.19

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.8

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.24

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.9

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.14

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.7

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.25

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.16

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.3

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.18

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.11

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.17

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.27

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.8

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.21

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.32

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.12

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.15

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.7

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.18

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.7.3

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.15

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.20

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.14

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.30

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.3

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.3

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.32

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.6

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.22

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.12

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.3

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.7

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.18

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.15

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.3

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.19

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.6.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.4

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.4

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.11

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.30

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.10

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.19

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.19

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.7

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.19

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.8

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.6

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.8

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.9

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.24

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.26

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.10

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.5

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.12

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.16

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.19

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.4

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.28

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.11

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.12

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.26

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.29

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.25

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.29

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.8.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.7

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.5

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.22

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.18

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.11

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.22

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.22

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.15

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.7

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.6.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.12

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.16

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.12

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.23

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.34

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.17

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.31

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.6

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.23

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.17

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.28

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.26

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.8

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.23

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.3

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.14

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.10

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.18

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.15

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.10

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.14

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.16

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.13

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.14

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.5

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.11

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.4

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.7.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.29

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.31

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.5

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.6

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.4

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.16

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.5

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.26

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.10

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.11

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.6

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.35

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.9

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.20

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.25

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.7.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.5

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.33

Trust: 1.0

vendor:tormodel:torscope:lteversion:0.2.2.33

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.13

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.6

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.21

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.15

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.8

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.13

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.2.17

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.27

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.6

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.6

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.0.7

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.27

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.21

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.10

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.9

Trust: 1.0

vendor:the tormodel:torscope:ltversion:0.2.2.34

Trust: 0.8

vendor:tormodel:<0.2.2.20-alphascope: - version: -

Trust: 0.6

vendor:tormodel:.21-alphascope:eqversion:0.2.2

Trust: 0.3

vendor:tormodel:.20-alphascope:eqversion:0.2.2

Trust: 0.3

vendor:tormodel:.19-alphascope:eqversion:0.2.2

Trust: 0.3

vendor:tormodel:.18-alphascope:eqversion:0.2.2

Trust: 0.3

vendor:tormodel:.17-alphascope:eqversion:0.2.2

Trust: 0.3

vendor:tormodel:.16-alphascope:eqversion:0.2.2

Trust: 0.3

vendor:tormodel:.15-alphascope:eqversion:0.2.2

Trust: 0.3

vendor:tormodel:.14-alphascope:eqversion:0.2.2

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.2.2

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.2.35

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.2.34

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.2.33

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.2.32

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.2.31

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.1.214

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.1.123

Trust: 0.3

vendor:tormodel:.5-alphascope:eqversion:0.1.1

Trust: 0.3

vendor:tormodel:.4-alphascope:eqversion:0.1.1

Trust: 0.3

vendor:tormodel:.3-alphascope:eqversion:0.1.1

Trust: 0.3

vendor:tormodel:.2-alphascope:eqversion:0.1.1

Trust: 0.3

vendor:tormodel:.1-alphascope:eqversion:0.1.1

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.118

Trust: 0.3

vendor:tormodel:alpha-cvsscope:eqversion:0.1.2.1

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1x8664

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:tormodel:torscope:neversion:0.2.2.34

Trust: 0.3

sources: CNVD: CNVD-2011-5558 // BID: 50414 // JVNDB: JVNDB-2011-003513 // NVD: CVE-2011-2769

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-2769
value: MEDIUM

Trust: 1.0

NVD: CVE-2011-2769
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2011-5558
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201110-701
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2011-2769
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2011-5558
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2011-5558 // JVNDB: JVNDB-2011-003513 // CNNVD: CNNVD-201110-701 // NVD: CVE-2011-2769

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.8

sources: JVNDB: JVNDB-2011-003513 // NVD: CVE-2011-2769

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 121258 // PACKETSTORM: 108997 // CNNVD: CNNVD-201110-701

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201110-701

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-003513

PATCH

title:Tor 0.2.2.34 is released (security patches)url:https://blog.torproject.org/blog/tor-02234-released-security-patches

Trust: 0.8

title:Tor Directory Remote Information Disclosure Bridge Enumeration Patchurl:https://www.cnvd.org.cn/patchInfo/show/35276

Trust: 0.6

title:Tor Repair measures for information disclosure vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172249

Trust: 0.6

sources: CNVD: CNVD-2011-5558 // JVNDB: JVNDB-2011-003513 // CNNVD: CNNVD-201110-701

EXTERNAL IDS

db:NVDid:CVE-2011-2769

Trust: 3.6

db:BIDid:50414

Trust: 1.5

db:JVNDBid:JVNDB-2011-003513

Trust: 0.8

db:SECUNIAid:46634

Trust: 0.7

db:SECUNIAid:46640

Trust: 0.7

db:CNVDid:CNVD-2011-5558

Trust: 0.6

db:NSFOCUSid:18089

Trust: 0.6

db:CNNVDid:CNNVD-201110-701

Trust: 0.6

db:PACKETSTORMid:106334

Trust: 0.1

db:PACKETSTORMid:106460

Trust: 0.1

db:PACKETSTORMid:121258

Trust: 0.1

db:PACKETSTORMid:106343

Trust: 0.1

db:PACKETSTORMid:108997

Trust: 0.1

sources: CNVD: CNVD-2011-5558 // BID: 50414 // JVNDB: JVNDB-2011-003513 // PACKETSTORM: 106334 // PACKETSTORM: 106460 // PACKETSTORM: 121258 // PACKETSTORM: 106343 // PACKETSTORM: 108997 // CNNVD: CNNVD-201110-701 // NVD: CVE-2011-2769

REFERENCES

url:https://blog.torproject.org/blog/tor-02234-released-security-patches

Trust: 2.1

url:http://www.debian.org/security/2011/dsa-2331

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2769

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-2769

Trust: 0.8

url:http://www.securityfocus.com/bid/50414/info

Trust: 0.6

url:http://secunia.com/advisories/46634

Trust: 0.6

url:http://secunia.com/advisories/46640

Trust: 0.6

url:http://www.securityfocus.com/bid/50414

Trust: 0.6

url:http://www.nsfocus.net/vulndb/18089

Trust: 0.6

url:http://www.torproject.org/index.html.en

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-2768

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-2769

Trust: 0.3

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/products/corporate/vim/ovum_2011_request/

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/advisories/46634/

Trust: 0.1

url:http://secunia.com/advisories/46634/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=46634

Trust: 0.1

url:http://secunia.com/advisories/46640/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=46640

Trust: 0.1

url:http://secunia.com/advisories/46640/#comments

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3518

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2768

Trust: 0.1

url:https://wiki.mageia.org/en/support/advisories/mgasa-2012-0276

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3519

Trust: 0.1

url:http://www.mandriva.com/en/support/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4419

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3517

Trust: 0.1

url:https://wiki.mageia.org/en/support/advisories/mgaa-2012-0184

Trust: 0.1

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3518

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5573

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3519

Trust: 0.1

url:https://wiki.mageia.org/en/support/advisories/mgasa-2012-0356

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4419

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3517

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5573

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2778

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201201-12.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2769

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2778

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2768

Trust: 0.1

sources: CNVD: CNVD-2011-5558 // BID: 50414 // JVNDB: JVNDB-2011-003513 // PACKETSTORM: 106334 // PACKETSTORM: 106460 // PACKETSTORM: 121258 // PACKETSTORM: 106343 // PACKETSTORM: 108997 // CNNVD: CNNVD-201110-701 // NVD: CVE-2011-2769

CREDITS

frosty_un

Trust: 0.9

sources: BID: 50414 // CNNVD: CNNVD-201110-701

SOURCES

db:CNVDid:CNVD-2011-5558
db:BIDid:50414
db:JVNDBid:JVNDB-2011-003513
db:PACKETSTORMid:106334
db:PACKETSTORMid:106460
db:PACKETSTORMid:121258
db:PACKETSTORMid:106343
db:PACKETSTORMid:108997
db:CNNVDid:CNNVD-201110-701
db:NVDid:CVE-2011-2769

LAST UPDATE DATE

2024-08-14T13:58:31.594000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-5558date:2011-10-31T00:00:00
db:BIDid:50414date:2015-05-07T17:17:00
db:JVNDBid:JVNDB-2011-003513date:2011-12-27T00:00:00
db:CNNVDid:CNNVD-201110-701date:2021-12-01T00:00:00
db:NVDid:CVE-2011-2769date:2012-01-19T03:58:41.177

SOURCES RELEASE DATE

db:CNVDid:CNVD-2011-5558date:2011-10-31T00:00:00
db:BIDid:50414date:2011-10-28T00:00:00
db:JVNDBid:JVNDB-2011-003513date:2011-12-27T00:00:00
db:PACKETSTORMid:106334date:2011-10-28T12:05:57
db:PACKETSTORMid:106460date:2011-11-01T07:54:34
db:PACKETSTORMid:121258date:2013-04-11T02:39:54
db:PACKETSTORMid:106343date:2011-10-28T21:21:09
db:PACKETSTORMid:108997date:2012-01-24T04:16:55
db:CNNVDid:CNNVD-201110-701date:1900-01-01T00:00:00
db:NVDid:CVE-2011-2769date:2011-12-23T03:59:21.990