Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2005-08-21T04:00:00
Updated: 2024-08-07T22:45:01.889Z
Reserved: 2005-08-21T00:00:00
Link: CVE-2005-2643
Vulnrichment
No data.
NVD
Status : Modified
Published: 2005-08-23T04:00:00.000
Modified: 2024-11-21T00:00:03.007
Link: CVE-2005-2643
Redhat
No data.