CVE-2006-3418
CVSS5.0
发布时间 :2006-07-06 20:05:00
修订时间 :2008-09-05 17:07:05
NMCO    

[原文]Tor before 0.1.1.20 does not validate that a server descriptor's fingerprint line matches its identity key, which allows remote attackers to spoof the fingerprint line, which might be trusted by users or other applications.


[CNNVD]Tor 验证服务器伪造权限漏洞(CNNVD-200607-093)

        Tor 0.1.1.20之前版本未验证服务器描述符的指纹线是否与其身份密钥匹配,远程攻击者伪造可能获得用户或其他应用程序信任的指纹线。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:tor:tor:0.1.1.5_alpha
cpe:/a:tor:tor:0.1.1.3_alpha
cpe:/a:tor:tor:0.0.9.8
cpe:/a:tor:tor:0.1.0.11
cpe:/a:tor:tor:0.0.2_pre23
cpe:/a:tor:tor:0.0.2
cpe:/a:tor:tor:0.0.2_pre15
cpe:/a:tor:tor:0.0.7.1
cpe:/a:tor:tor:0.1.0.16
cpe:/a:tor:tor:0.1.0.19
cpe:/a:tor:tor:0.0.2_pre22
cpe:/a:tor:tor:0.0.2_pre17
cpe:/a:tor:tor:0.1.1.8_alpha
cpe:/a:tor:tor:0.0.9.6
cpe:/a:tor:tor:0.1.1.7_alpha
cpe:/a:tor:tor:0.0.2_pre26
cpe:/a:tor:tor:0.0.9
cpe:/a:tor:tor:0.1.0.3
cpe:/a:tor:tor:0.0.8.1
cpe:/a:tor:tor:0.0.2_pre25
cpe:/a:tor:tor:0.0.2_pre16
cpe:/a:tor:tor:0.0.9.3
cpe:/a:tor:tor:0.1.1.9_alpha
cpe:/a:tor:tor:0.0.2_pre13
cpe:/a:tor:tor:0.1.0.9
cpe:/a:tor:tor:0.0.2_pre20
cpe:/a:tor:tor:0.1.0.17
cpe:/a:tor:tor:0.1.1.6_alpha
cpe:/a:tor:tor:0.1.0.6
cpe:/a:tor:tor:0.0.6.2
cpe:/a:tor:tor:0.1.0.1
cpe:/a:tor:tor:0.1.0.5
cpe:/a:tor:tor:0.0.8
cpe:/a:tor:tor:0.0.2_pre21
cpe:/a:tor:tor:0.1.0.2
cpe:/a:tor:tor:0.0.2_pre24
cpe:/a:tor:tor:0.0.9.2
cpe:/a:tor:tor:0.0.9.5
cpe:/a:tor:tor:0.1.1.4_alpha
cpe:/a:tor:tor:0.0.9.9
cpe:/a:tor:tor:0.0.4
cpe:/a:tor:tor:0.0.2_pre27
cpe:/a:tor:tor:0.0.2_pre19
cpe:/a:tor:tor:0.1.1.2_alpha
cpe:/a:tor:tor:0.0.3
cpe:/a:tor:tor:0.1.0.15
cpe:/a:tor:tor:0.0.9.1
cpe:/a:tor:tor:0.1.1.10_alpha
cpe:/a:tor:tor:0.0.6.1
cpe:/a:tor:tor:0.0.7.3
cpe:/a:tor:tor:0.0.2_pre14
cpe:/a:tor:tor:0.0.6
cpe:/a:tor:tor:0.1.0.4
cpe:/a:tor:tor:0.1.0.10
cpe:/a:tor:tor:0.1.0.8
cpe:/a:tor:tor:0.1.0.7
cpe:/a:tor:tor:0.0.9.4
cpe:/a:tor:tor:0.1.0.18
cpe:/a:tor:tor:0.1.0.14
cpe:/a:tor:tor:0.0.2_pre18
cpe:/a:tor:tor:0.0.9.7
cpe:/a:tor:tor:0.1.0.13
cpe:/a:tor:tor:0.0.7
cpe:/a:tor:tor:0.0.7.2
cpe:/a:tor:tor:0.0.5
cpe:/a:tor:tor:0.0.9.10
cpe:/a:tor:tor:0.1.0.12
cpe:/a:tor:tor:0.1.1.1_alpha

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3418
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3418
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200607-093
(官方数据源) CNNVD

- 其它链接及资源

http://secunia.com/advisories/20514
(VENDOR_ADVISORY)  SECUNIA  20514
http://tor.eff.org/cvs/tor/ChangeLog
(UNKNOWN)  CONFIRM  http://tor.eff.org/cvs/tor/ChangeLog
http://security.gentoo.org/glsa/glsa-200606-04.xml
(UNKNOWN)  GENTOO  GLSA-200606-04

- 漏洞信息

Tor 验证服务器伪造权限漏洞
中危 未知
2006-07-06 00:00:00 2006-07-10 00:00:00
远程  
        Tor 0.1.1.20之前版本未验证服务器描述符的指纹线是否与其身份密钥匹配,远程攻击者伪造可能获得用户或其他应用程序信任的指纹线。

- 公告与补丁

        暂无数据

- 漏洞信息

25881
EFF Tor Server Descriptor Fingerprint/Identity Mismatch Weakness
Vendor Verified

- 漏洞描述

- 时间线

2006-05-23 Unknow
Unknow 2006-05-23

- 解决方案

Upgrade to version 0.1.1.20 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站