Vulnerability Description
Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tor | Tor | 0.0.9 |
References
- http://archives.seul.org/or/announce/Aug-2005/msg00002.htmlVendor Advisory
- http://marc.info/?l=bugtraq&m=112448002732443&w=2
- http://secunia.com/advisories/16424PatchVendor Advisory
- http://securitytracker.com/id?1014739
- http://archives.seul.org/or/announce/Aug-2005/msg00002.htmlVendor Advisory
- http://marc.info/?l=bugtraq&m=112448002732443&w=2
- http://secunia.com/advisories/16424PatchVendor Advisory
- http://securitytracker.com/id?1014739
FAQ
What is CVE-2005-2643?
CVE-2005-2643 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers...
How severe is CVE-2005-2643?
CVE-2005-2643 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-2643?
Check the references section above for vendor advisories and patch information. Affected products include: Tor Tor.