CVE-2013-7295
17.01.2014, 21:55
Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors.Enginsight
Vendor | Product | Version |
---|---|---|
torproject | tor | 𝑥 ≤ 0.2.4.19 |
torproject | tor | 0.2.4.1:alpha |
torproject | tor | 0.2.4.2:alpha |
torproject | tor | 0.2.4.3:alpha |
torproject | tor | 0.2.4.4:alpha |
torproject | tor | 0.2.4.5:alpha |
torproject | tor | 0.2.4.6:alpha |
torproject | tor | 0.2.4.7:alpha |
torproject | tor | 0.2.4.8:alpha |
torproject | tor | 0.2.4.9:alpha |
torproject | tor | 0.2.4.10:alpha |
torproject | tor | 0.2.4.11:alpha |
torproject | tor | 0.2.4.12:alpha |
torproject | tor | 0.2.4.13:alpha |
torproject | tor | 0.2.4.14:alpha |
torproject | tor | 0.2.4.15:rc |
torproject | tor | 0.2.4.16:rc |
torproject | tor | 0.2.4.17:rc |
torproject | tor | 0.2.4.18:rc |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration