CVE-2005-2643
CVSS5.0
发布时间 :2005-08-23 00:00:00
修订时间 :2016-10-17 23:29:18
NMCOPS    

[原文]Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit.


[CNNVD]Tor 远程信息泄露漏洞 (CNNVD-200508-254)

        当使用短暂的Diffie-Hellman (DH) 握手时,Tor 0.1.0.13及其早期版本以及试验版本0.1.1.4-alpha及早期版本不能拒绝某些弱密钥。这使得恶意的Tor服务器可以获得客户端使用的密钥而用于线路中的其它系统。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:tor:tor:0.1.0.6
cpe:/a:tor:tor:0.1.0.5
cpe:/a:tor:tor:0.1.0.8
cpe:/a:tor:tor:0.1.0.7
cpe:/a:tor:tor:0.1.0.2
cpe:/a:tor:tor:0.1.0.1
cpe:/a:tor:tor:0.1.0.4
cpe:/a:tor:tor:0.1.0.3
cpe:/a:tor:tor:0.0.9
cpe:/a:tor:tor:0.1.1.3_alpha
cpe:/a:tor:tor:0.1.0.9
cpe:/a:tor:tor:0.1.1.1_alpha
cpe:/a:tor:tor:0.0.9.8
cpe:/a:tor:tor:0.1.0.10
cpe:/a:tor:tor:0.0.9.7
cpe:/a:tor:tor:0.1.0.11
cpe:/a:tor:tor:0.0.9.6
cpe:/a:tor:tor:0.1.0.12
cpe:/a:tor:tor:0.0.9.5
cpe:/a:tor:tor:0.1.0.13
cpe:/a:tor:tor:0.0.9.9
cpe:/a:tor:tor:0.0.9.4
cpe:/a:tor:tor:0.0.9.3
cpe:/a:tor:tor:0.0.9.2
cpe:/a:tor:tor:0.1.1.4_alpha
cpe:/a:tor:tor:0.0.9.1
cpe:/a:tor:tor:0.1.1.2_alpha

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2643
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2643
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200508-254
(官方数据源) CNNVD

- 其它链接及资源

http://archives.seul.org/or/announce/Aug-2005/msg00002.html
(VENDOR_ADVISORY)  MLIST  [or-announce] 20050811 Tor security advisory: DH handshake flaw
http://marc.info/?l=bugtraq&m=112448002732443&w=2
(UNKNOWN)  BUGTRAQ  20050819 Fwd: Tor security advisory: DH handshake flaw
http://securitytracker.com/id?1014739
(UNKNOWN)  SECTRACK  1014739

- 漏洞信息

Tor 远程信息泄露漏洞
中危 设计错误
2005-08-23 00:00:00 2005-10-20 00:00:00
远程  
        当使用短暂的Diffie-Hellman (DH) 握手时,Tor 0.1.0.13及其早期版本以及试验版本0.1.1.4-alpha及早期版本不能拒绝某些弱密钥。这使得恶意的Tor服务器可以获得客户端使用的密钥而用于线路中的其它系统。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        Tor Tor 0.1 .0.13
        Tor tor-0.1.0.14.tar.gz
        http://tor.eff.org/dist/tor-0.1.0.14.tar.gz
        Tor Tor 0.1 .0.10
        Tor tor-0.1.0.14.tar.gz
        http://tor.eff.org/dist/tor-0.1.0.14.tar.gz
        Tor Tor 0.1 .0.11
        Tor tor-0.1.0.14.tar.gz
        http://tor.eff.org/dist/tor-0.1.0.14.tar.gz
        Tor Tor 0.1 .0.12
        Tor tor-0.1.0.14.tar.gz
        http://tor.eff.org/dist/tor-0.1.0.14.tar.gz
        Tor Tor 0.1.1 .1-alpha
        Tor tor-0.1.1.5-alpha.tar.gz
        http://tor.eff.org/dist/tor-0.1.1.5-alpha.tar.gz
        Tor Tor 0.1.1 .4-alpha
        Tor tor-0.1.1.5-alpha.tar.gz
        http://tor.eff.org/dist/tor-0.1.1.5-alpha.tar.gz
        Tor Tor 0.1.1 .3-alpha
        Tor tor-0.1.1.5-alpha.tar.gz
        http://tor.eff.org/dist/tor-0.1.1.5-alpha.tar.gz
        Tor Tor 0.1.1 .2-alpha
        Tor tor-0.1.1.5-alpha.tar.gz
        http://tor.eff.org/dist/tor-0.1.1.5-alpha.tar.gz

- 漏洞信息 (F39595)

Gentoo Linux Security Advisory 200508-16 (PacketStormID:F39595)
2005-08-25 00:00:00
Gentoo  security.gentoo.org
advisory
linux,gentoo
CVE-2005-2643
[点击下载]

Gentoo Linux Security Advisory GLSA 200508-16 - The Diffie-Hellman implementation of Tor fails to verify the cryptographic strength of keys which are used during handshakes. Versions less than 0.1.0.14 are affected.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200508-16
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Low
     Title: Tor: Information disclosure
      Date: August 25, 2005
      Bugs: #102245
        ID: 200508-16

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

A flaw in Tor leads to the disclosure of information and the loss of
anonymity, integrity and confidentiality.

Background
==========

Tor is an implementation of second generation Onion Routing, a
connection-oriented anonymizing communication service.

Affected packages
=================

    -------------------------------------------------------------------
     Package       /  Vulnerable  /                         Unaffected
    -------------------------------------------------------------------
  1  net-misc/tor     < 0.1.0.14                           >= 0.1.0.14

Description
===========

The Diffie-Hellman implementation of Tor fails to verify the
cryptographic strength of keys which are used during handshakes.

Impact
======

By setting up a malicious Tor server and enticing users to use this
server as first hop, a remote attacker could read and modify all
traffic of the user.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Tor users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=net-misc/tor-0.1.0.14"

References
==========

  [ 1 ] CAN-2005-2643
        http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2643
  [ 2 ] Tor Security Announcement
        http://archives.seul.org/or/announce/Aug-2005/msg00002.html

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200508-16.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0
    

- 漏洞信息

18560
EFF Tor Unspecified Client Crypto Handshake Issue
Location Unknown Cryptographic
Loss of Confidentiality

- 漏洞描述

Tor contains a flaw related to the crypto handshakes. No further details have been provided.

- 时间线

2005-08-05 Unknow
Unknow 2005-08-08

- 解决方案

Upgrade to version 0.1.0.14 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Tor Cryptographic Handshake Remote Information Disclosure Vulnerability
Design Error 14659
Yes No
2005-08-25 12:00:00 2009-07-12 05:06:00
The vendor disclosed this issue.

- 受影响的程序版本

Tor Tor 0.1.1 .4-alpha
Tor Tor 0.1.1 .3-alpha
Tor Tor 0.1.1 .2-alpha
Tor Tor 0.1.1 .1-alpha
Tor Tor 0.1 .0.13
Tor Tor 0.1 .0.12
Tor Tor 0.1 .0.11
Tor Tor 0.1 .0.10
Gentoo Linux
Tor Tor 0.1.1 .5-alpha
Tor Tor 0.1 .0.14

- 不受影响的程序版本

Tor Tor 0.1.1 .5-alpha
Tor Tor 0.1 .0.14

- 漏洞讨论

Tor is susceptible to a remote information disclosure vulnerability. This issue is due to a flaw in the implementation of the Diffie-Hellman key exchange protocol.

Specifically, certain values used during the Diffie-Hellman key exchange protocol are insecure, and when used, lead to the ability of attackers to access the negotiated encryption keys.

This vulnerability allows attackers to gain access to the negotiated keys used to encrypt the communications between Tor servers and clients. This allows attackers to read or modify all the traffic that is sent from the targeted user over the Tor network. The anonymity, confidentiality, and integrity guarantees of the network are lost through the exploitation of this issue.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

The vendor has released an advisory and fixes to address this issue. Please see the referenced advisory for further information.

Gentoo Linux has released advisory GLSA 200508-16 to address this issue. Users of affected packages are urged to execute the following commands with superuser privileges:
emerge --sync
emerge --ask --oneshot --verbose ">=net-misc/tor-0.1.0.14"
Please see the referenced advisory for further information.


Tor Tor 0.1 .0.13

Tor Tor 0.1 .0.10

Tor Tor 0.1 .0.11

Tor Tor 0.1 .0.12

Tor Tor 0.1.1 .1-alpha

Tor Tor 0.1.1 .4-alpha

Tor Tor 0.1.1 .3-alpha

Tor Tor 0.1.1 .2-alpha

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站