Vulnerability Description
Tor before 0.1.1.20 creates "internal circuits" primarily consisting of nodes with "useful exit nodes," which allows remote attackers to conduct unspecified statistical attacks.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tor | Tor | 0.0.2 |
References
- http://secunia.com/advisories/20277PatchVendor Advisory
- http://secunia.com/advisories/20514PatchVendor Advisory
- http://security.gentoo.org/glsa/glsa-200606-04.xml
- http://tor.eff.org/cvs/tor/ChangeLog
- http://www.osvdb.org/25882
- http://www.securityfocus.com/bid/18323Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26798
- http://secunia.com/advisories/20277PatchVendor Advisory
- http://secunia.com/advisories/20514PatchVendor Advisory
- http://security.gentoo.org/glsa/glsa-200606-04.xml
- http://tor.eff.org/cvs/tor/ChangeLog
- http://www.osvdb.org/25882
- http://www.securityfocus.com/bid/18323Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26798
FAQ
What is CVE-2006-3410?
CVE-2006-3410 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Tor before 0.1.1.20 creates "internal circuits" primarily consisting of nodes with "useful exit nodes," which allows remote attackers to conduct unspecified statistical attacks.
How severe is CVE-2006-3410?
CVE-2006-3410 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3410?
Check the references section above for vendor advisories and patch information. Affected products include: Tor Tor.