Some weaknesses and a vulnerability have been reported in Tor, which potentially can be exploited by malicious people to bypass certain security restrictions, disclose certain sensitive information, or potentially cause a DoS (Denial of Service).
1) An error in the handling of streamid's from different exits within a circuit can be exploited e.g. by a malicious Tor server within the circuit to inject arbitrary data into the TCP stream.
2) Sending destroy cells from a circuit's origin includes sending out a reason for tearing down the circuit. This weakens the Tor anonymity concept and may allow an attacker to narrow down users from a larger list.
3) An error in the handling of guard nodes can be exploited to aid in anonymity-related attacks.
4) A boundary error within the BSD natd support can be exploited to e.g. crash the application.
Successful exploitation requires that the Natdport configuration option is added to the torrc file on a BSD system.
The weaknesses and vulnerability are reported in versions prior to 0.1.2.15.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Tor Multiple Weaknesses and Vulnerability
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.