CVE-2009-0654

Tor 0.2.0.28, and probably 0.2.0.34 and earlier, allows remote attackers, with control of an entry router and an exit router, to confirm that a sender and receiver are communicating via vectors involving (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, and then observing cell recognition errors at the exit router.  NOTE: the vendor disputes the significance of this issue, noting that the product's design "accepted end-to-end correlation as an attack that is too expensive to solve."
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.1 UNKNOWN
NETWORK
HIGH
AV:N/AC:H/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 64%
VendorProductVersion
tortor
𝑥
≤ 0.2.0.34
tortor
0.2.0.1:alpha
tortor
0.2.0.2:alpha
tortor
0.2.0.3:alpha
tortor
0.2.0.4:alpha
tortor
0.2.0.5:alpha
tortor
0.2.0.6:alpha
tortor
0.2.0.7:alpha
tortor
0.2.0.8:alpha
tortor
0.2.0.9:alpha
tortor
0.2.0.10:alpha
tortor
0.2.0.11:alpha
tortor
0.2.0.12:alpha
tortor
0.2.0.13:alpha
tortor
0.2.0.14:alpha
tortor
0.2.0.15:alpha
tortor
0.2.0.16:alpha
tortor
0.2.0.17:alpha
tortor
0.2.0.18:alpha
tortor
0.2.0.19:alpha
tortor
0.2.0.20:alpha
tortor
0.2.0.21:alpha
tortor
0.2.0.22:alpha
tortor
0.2.0.23:alpha
tortor
0.2.0.24:alpha
tortor
0.2.0.25:alpha
tortor
0.2.0.26:alpha
tortor
0.2.0.27:alpha
tortor
0.2.0.28:alpha
tortor
0.2.0.29:alpha
tortor
0.2.0.30:alpha
tortor
0.2.0.31:alpha
tortor
0.2.0.32:alpha
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
tor
bullseye (security)
unimportant
bullseye
unimportant
bookworm
unimportant
bookworm (security)
unimportant
sid
unimportant
trixie
unimportant
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tor
oneiric
not-affected
natty
not-affected
maverick
dne
lucid
dne
karmic
dne
jaunty
dne
intrepid
ignored
hardy
ignored
gutsy
ignored
dapper
ignored