Vulnerability Details CVE-2005-2643
Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 60.3%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2005-2643
-
-
cpe:2.3:a:tor:tor:0.0.9.1
-
cpe:2.3:a:tor:tor:0.0.9.2
-
cpe:2.3:a:tor:tor:0.0.9.3
-
cpe:2.3:a:tor:tor:0.0.9.4
-
cpe:2.3:a:tor:tor:0.0.9.5
-
cpe:2.3:a:tor:tor:0.0.9.6
-
cpe:2.3:a:tor:tor:0.0.9.7
-
cpe:2.3:a:tor:tor:0.0.9.8
-
cpe:2.3:a:tor:tor:0.0.9.9
-
cpe:2.3:a:tor:tor:0.1.0.1
-
cpe:2.3:a:tor:tor:0.1.0.10
-
cpe:2.3:a:tor:tor:0.1.0.11
-
cpe:2.3:a:tor:tor:0.1.0.12
-
cpe:2.3:a:tor:tor:0.1.0.13
-
cpe:2.3:a:tor:tor:0.1.0.2
-
cpe:2.3:a:tor:tor:0.1.0.3
-
cpe:2.3:a:tor:tor:0.1.0.4
-
cpe:2.3:a:tor:tor:0.1.0.5
-
cpe:2.3:a:tor:tor:0.1.0.6
-
cpe:2.3:a:tor:tor:0.1.0.7
-
cpe:2.3:a:tor:tor:0.1.0.8
-
cpe:2.3:a:tor:tor:0.1.0.9
-
Tor
»
Tor
»
Version: 0.1.1.1_alpha
cpe:2.3:a:tor:tor:0.1.1.1_alpha
-
Tor
»
Tor
»
Version: 0.1.1.2_alpha
cpe:2.3:a:tor:tor:0.1.1.2_alpha
-
Tor
»
Tor
»
Version: 0.1.1.3_alpha
cpe:2.3:a:tor:tor:0.1.1.3_alpha
-
Tor
»
Tor
»
Version: 0.1.1.4_alpha
cpe:2.3:a:tor:tor:0.1.1.4_alpha