Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T22:45:01.889Z
Reserved: 2005-08-21T00:00:00
Link: CVE-2005-2643

No data.

Status : Modified
Published: 2005-08-23T04:00:00.000
Modified: 2024-11-21T00:00:03.007
Link: CVE-2005-2643

No data.