Vulnerability Name:

CVE-2009-0654

Assigned:2009-02-20
Published:2009-02-20
Updated:2009-02-25
Summary:Tor 0.2.0.28, and probably 0.2.0.34 and earlier, allows remote attackers, with control of an entry router and an exit router, to confirm that a sender and receiver are communicating via vectors involving (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, and then observing cell recognition errors at the exit router.
Note: the vendor disputes the significance of this issue, noting that the product's design "accepted end-to-end correlation as an attack that is too expensive to solve."
CVSS v3 Severity:5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
References:Source: MISC
Type: UNKNOWN
http://blog.torproject.org/blog/one-cell-enough

Source: MITRE
Type: CNA
CVE-2009-0654

Source: MISC
Type: UNKNOWN
http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Fu

Source: MISC
Type: Exploit
http://www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf

Vulnerable Configuration:Configuration 1:
  • cpe:/a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*
  • OR cpe:/a:tor:tor:*:alpha:*:*:*:*:*:* (Version <= 0.2.0.34)

  • * Denotes that component is vulnerable
    BACK
    tor tor 0.2.0.1 alpha
    tor tor 0.2.0.2 alpha
    tor tor 0.2.0.3 alpha
    tor tor 0.2.0.4 alpha
    tor tor 0.2.0.5 alpha
    tor tor 0.2.0.6 alpha
    tor tor 0.2.0.7 alpha
    tor tor 0.2.0.8 alpha
    tor tor 0.2.0.9 alpha
    tor tor 0.2.0.10 alpha
    tor tor 0.2.0.11 alpha
    tor tor 0.2.0.12 alpha
    tor tor 0.2.0.13 alpha
    tor tor 0.2.0.14 alpha
    tor tor 0.2.0.15 alpha
    tor tor 0.2.0.16 alpha
    tor tor 0.2.0.17 alpha
    tor tor 0.2.0.18 alpha
    tor tor 0.2.0.19 alpha
    tor tor 0.2.0.20 alpha
    tor tor 0.2.0.21 alpha
    tor tor 0.2.0.22 alpha
    tor tor 0.2.0.23 alpha
    tor tor 0.2.0.24 alpha
    tor tor 0.2.0.25 alpha
    tor tor 0.2.0.26 alpha
    tor tor 0.2.0.27 alpha
    tor tor 0.2.0.28 alpha
    tor tor 0.2.0.29 alpha
    tor tor 0.2.0.30 alpha
    tor tor 0.2.0.31 alpha
    tor tor 0.2.0.32 alpha
    tor tor * alpha