CVE-2013-7295

EUVD-2013-7072
Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4 UNKNOWN
NETWORK
HIGH
AV:N/AC:H/Au:N/C:P/I:P/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 32%
Affected Products (NVD)
VendorProductVersion
torprojecttor
𝑥
≤ 0.2.4.19
torprojecttor
0.2.4.1:alpha
torprojecttor
0.2.4.2:alpha
torprojecttor
0.2.4.3:alpha
torprojecttor
0.2.4.4:alpha
torprojecttor
0.2.4.5:alpha
torprojecttor
0.2.4.6:alpha
torprojecttor
0.2.4.7:alpha
torprojecttor
0.2.4.8:alpha
torprojecttor
0.2.4.9:alpha
torprojecttor
0.2.4.10:alpha
torprojecttor
0.2.4.11:alpha
torprojecttor
0.2.4.12:alpha
torprojecttor
0.2.4.13:alpha
torprojecttor
0.2.4.14:alpha
torprojecttor
0.2.4.15:rc
torprojecttor
0.2.4.16:rc
torprojecttor
0.2.4.17:rc
torprojecttor
0.2.4.18:rc
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
tor
bookworm
0.4.7.16-1
fixed
bookworm (security)
0.4.7.16-1
fixed
bullseye
0.4.5.16-1
fixed
bullseye (security)
0.4.5.16-1
fixed
sid
0.4.8.13-2
fixed
squeeze
not-affected
trixie
0.4.8.13-2
fixed
wheezy
no-dsa
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tor
lucid
dne
precise
ignored
quantal
ignored
raring
ignored
saucy
ignored
trusty
not-affected
utopic
not-affected
vivid
not-affected
wily
not-affected
xenial
not-affected
yakkety
not-affected
zesty
not-affected
Common Weakness Enumeration