CVE-2009-2426
10.07.2009, 17:30
The connection_edge_process_relay_cell_not_open function in src/or/relay.c in Tor 0.2.x before 0.2.0.35 and 0.1.x before 0.1.2.8-beta allows exit relays to have an unspecified impact by causing controllers to accept DNS responses that redirect to an internal IP address via unknown vectors. NOTE: some of these details are obtained from third party information.Enginsight
Vendor | Product | Version |
---|---|---|
tor | tor | 0.1.0.1 |
tor | tor | 0.1.0.2 |
tor | tor | 0.1.0.3 |
tor | tor | 0.1.0.4 |
tor | tor | 0.1.0.5 |
tor | tor | 0.1.0.6 |
tor | tor | 0.1.0.7 |
tor | tor | 0.1.0.8 |
tor | tor | 0.1.0.9 |
tor | tor | 0.1.0.10 |
tor | tor | 0.1.0.11 |
tor | tor | 0.1.0.12 |
tor | tor | 0.1.0.13 |
tor | tor | 0.1.0.14 |
tor | tor | 0.1.0.15 |
tor | tor | 0.1.0.16 |
tor | tor | 0.1.0.17 |
tor | tor | 0.1.0.18 |
tor | tor | 0.1.0.19 |
tor | tor | 0.1.1 |
tor | tor | 0.1.1.1 |
tor | tor | 0.1.1.1_alpha:_alpha |
tor | tor | 0.1.1.2 |
tor | tor | 0.1.1.2_alpha:_alpha |
tor | tor | 0.1.1.3 |
tor | tor | 0.1.1.3_alpha:_alpha |
tor | tor | 0.1.1.4 |
tor | tor | 0.1.1.4_alpha:_alpha |
tor | tor | 0.1.1.5 |
tor | tor | 0.1.1.5_alpha:_alpha |
tor | tor | 0.1.1.6 |
tor | tor | 0.1.1.6_alpha:_alpha |
tor | tor | 0.1.1.7 |
tor | tor | 0.1.1.7_alpha:_alpha |
tor | tor | 0.1.1.8 |
tor | tor | 0.1.1.8_alpha:_alpha |
tor | tor | 0.1.1.9 |
tor | tor | 0.1.1.9_alpha:_alpha |
tor | tor | 0.1.1.10 |
tor | tor | 0.1.1.10_alpha:_alpha |
tor | tor | 0.1.1.11 |
tor | tor | 0.1.1.12 |
tor | tor | 0.1.1.13 |
tor | tor | 0.1.1.14 |
tor | tor | 0.1.1.15 |
tor | tor | 0.1.1.16 |
tor | tor | 0.1.1.17 |
tor | tor | 0.1.1.18 |
tor | tor | 0.1.1.19 |
tor | tor | 0.1.1.20 |
tor | tor | 0.1.1.21 |
tor | tor | 0.1.1.22 |
tor | tor | 0.1.1.23 |
tor | tor | 0.1.1.25 |
tor | tor | 0.1.1.26 |
tor | tor | 0.1.2.1_alpha-cvs:_alpha |
tor | tor | 0.1.2.2 |
tor | tor | 0.1.2.3:alpha |
tor | tor | 0.1.2.4 |
tor | tor | 0.1.2.5 |
tor | tor | 0.1.2.5:alpha |
tor | tor | 0.1.2.6:alpha |
tor | tor | 0.1.2.7:alpha |
tor | tor | 0.2.0.1:alpha |
tor | tor | 0.2.0.2:alpha |
tor | tor | 0.2.0.3:alpha |
tor | tor | 0.2.0.4:alpha |
tor | tor | 0.2.0.5:alpha |
tor | tor | 0.2.0.6:alpha |
tor | tor | 0.2.0.7:alpha |
tor | tor | 0.2.0.8:alpha |
tor | tor | 0.2.0.9:alpha |
tor | tor | 0.2.0.10:alpha |
tor | tor | 0.2.0.11:alpha |
tor | tor | 0.2.0.12:alpha |
tor | tor | 0.2.0.13:alpha |
tor | tor | 0.2.0.14:alpha |
tor | tor | 0.2.0.15:alpha |
tor | tor | 0.2.0.16:alpha |
tor | tor | 0.2.0.17:alpha |
tor | tor | 0.2.0.18:alpha |
tor | tor | 0.2.0.19:alpha |
tor | tor | 0.2.0.20:alpha |
tor | tor | 0.2.0.21:alpha |
tor | tor | 0.2.0.22:alpha |
tor | tor | 0.2.0.23:alpha |
tor | tor | 0.2.0.24:alpha |
tor | tor | 0.2.0.25:alpha |
tor | tor | 0.2.0.26:alpha |
tor | tor | 0.2.0.27:alpha |
tor | tor | 0.2.0.28:alpha |
tor | tor | 0.2.0.29:alpha |
tor | tor | 0.2.0.31:alpha |
tor | tor | 0.2.0.33 |
tor | tor | 0.2.0.34:alpha |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References