Vulnerability Details CVE-2009-0654
Tor 0.2.0.28, and probably 0.2.0.34 and earlier, allows remote attackers, with control of an entry router and an exit router, to confirm that a sender and receiver are communicating via vectors involving (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, and then observing cell recognition errors at the exit router. NOTE: the vendor disputes the significance of this issue, noting that the product's design "accepted end-to-end correlation as an attack that is too expensive to solve."
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 64.3%
CVSS Severity
CVSS v2 Score 5.1
Products affected by CVE-2009-0654
-
-
cpe:2.3:a:tor:tor:0.2.0.1
-
cpe:2.3:a:tor:tor:0.2.0.10
-
cpe:2.3:a:tor:tor:0.2.0.11
-
cpe:2.3:a:tor:tor:0.2.0.12
-
cpe:2.3:a:tor:tor:0.2.0.13
-
cpe:2.3:a:tor:tor:0.2.0.14
-
cpe:2.3:a:tor:tor:0.2.0.15
-
cpe:2.3:a:tor:tor:0.2.0.16
-
cpe:2.3:a:tor:tor:0.2.0.17
-
cpe:2.3:a:tor:tor:0.2.0.18
-
cpe:2.3:a:tor:tor:0.2.0.19
-
cpe:2.3:a:tor:tor:0.2.0.2
-
cpe:2.3:a:tor:tor:0.2.0.20
-
cpe:2.3:a:tor:tor:0.2.0.21
-
cpe:2.3:a:tor:tor:0.2.0.22
-
cpe:2.3:a:tor:tor:0.2.0.23
-
cpe:2.3:a:tor:tor:0.2.0.24
-
cpe:2.3:a:tor:tor:0.2.0.25
-
cpe:2.3:a:tor:tor:0.2.0.26
-
cpe:2.3:a:tor:tor:0.2.0.27
-
cpe:2.3:a:tor:tor:0.2.0.28
-
cpe:2.3:a:tor:tor:0.2.0.29
-
cpe:2.3:a:tor:tor:0.2.0.3
-
cpe:2.3:a:tor:tor:0.2.0.30
-
cpe:2.3:a:tor:tor:0.2.0.31
-
cpe:2.3:a:tor:tor:0.2.0.32
-
cpe:2.3:a:tor:tor:0.2.0.4
-
cpe:2.3:a:tor:tor:0.2.0.5
-
cpe:2.3:a:tor:tor:0.2.0.6
-
cpe:2.3:a:tor:tor:0.2.0.7
-
cpe:2.3:a:tor:tor:0.2.0.8
-
cpe:2.3:a:tor:tor:0.2.0.9