CVE-2005-2643

high

Description

Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit.

References

http://securitytracker.com/id?1014739

http://secunia.com/advisories/16424

http://marc.info/?l=bugtraq&m=112448002732443&w=2

http://archives.seul.org/or/announce/Aug-2005/msg00002.html

Details

Source: Mitre, NVD

Published: 2005-08-23

Updated: 2016-10-18

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Severity: High