Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:14107
HistoryAug 31, 2006 - 12:00 a.m.

[SA21708] Tor Denial of Service and Traffic Routing

2006-08-3100:00:00
vulners.com
10

TITLE:
Tor Denial of Service and Traffic Routing

SECUNIA ADVISORY ID:
SA21708

VERIFY ADVISORY:
http://secunia.com/advisories/21708/

CRITICAL:
Less critical

IMPACT:
Security Bypass, DoS

WHERE:
>From remote

SOFTWARE:
Tor 0.1.0.x
http://secunia.com/product/5269/
Tor 0.1.1.x
http://secunia.com/product/11789/

DESCRIPTION:
A vulnerability and a weakness have been reported in Tor, which can
be exploited by malicious people to cause a DoS (Denial of Service)
and bypass certain security restrictions.

Two unspecified errors in the communication handling can be exploited
by a malicious Tor server to route traffic through the client to the
Tor network or crash the client.

Successful exploitation requires that the malicious Tor server is the
first server in the path (entry node).

The vulnerability and the weakness have been reported in versions
prior to 0.1.0.18 and 0.1.1.23 for the 0.1.0.x and 0.1.1.x branches,
and in version 0.1.2.1-alpha-cvs.

SOLUTION:
Update to version 0.1.0.18 or 0.1.1.23.
http://tor.eff.org/download.html.en

PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.

ORIGINAL ADVISORY:
http://archives.seul.org/or/announce/Aug-2006/msg00001.html


About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.