Vulnerability Description
Tor before 0.1.1.20 does not sufficiently obey certain firewall options, which allows remote attackers to bypass intended access restrictions for dirservers, direct connections, or proxy servers.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tor | Tor | 0.0.2 |
References
- http://secunia.com/advisories/20514PatchVendor Advisory
- http://security.gentoo.org/glsa/glsa-200606-04.xmlPatchVendor Advisory
- http://tor.eff.org/cvs/tor/ChangeLog
- http://www.osvdb.org/25874
- http://secunia.com/advisories/20514PatchVendor Advisory
- http://security.gentoo.org/glsa/glsa-200606-04.xmlPatchVendor Advisory
- http://tor.eff.org/cvs/tor/ChangeLog
- http://www.osvdb.org/25874
FAQ
What is CVE-2006-3412?
CVE-2006-3412 is a vulnerability with a CVSS score of 6.4 (MEDIUM). Tor before 0.1.1.20 does not sufficiently obey certain firewall options, which allows remote attackers to bypass intended access restrictions for dirservers, direct connections, or proxy servers.
How severe is CVE-2006-3412?
CVE-2006-3412 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3412?
Check the references section above for vendor advisories and patch information. Affected products include: Tor Tor.