Vulnerability Description
Tor allows remote attackers to discover the IP address of a hidden service by accessing this service at a high rate, thereby changing the server's CPU temperature and consequently changing the pattern of time values visible through (1) ICMP timestamps, (2) TCP sequence numbers, and (3) TCP timestamps, a different vulnerability than CVE-2006-0414. NOTE: it could be argued that this is a laws-of-physics vulnerability that is a fundamental design limitation of certain hardware implementations, so perhaps this issue should not be included in CVE.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tor | Tor | 0.1.1.26 |
References
- http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html
- http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdfExploit
- http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-servic
- http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html
- http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdfExploit
- http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-servic
FAQ
What is CVE-2006-6893?
CVE-2006-6893 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Tor allows remote attackers to discover the IP address of a hidden service by accessing this service at a high rate, thereby changing the server's CPU temperature and consequently changing the pattern...
How severe is CVE-2006-6893?
CVE-2006-6893 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6893?
Check the references section above for vendor advisories and patch information. Affected products include: Tor Tor.