FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

tor -- diffie-hellman handshake flaw

Affected packages
tor < 0.1.0.14

Details

VuXML ID 5fde5c30-0f4e-11da-bc01-000e0c2e438a
Discovery 2005-08-11
Entry 2005-08-17
Modified 2005-09-21

A tor advisory reports

Tor clients can completely loose anonymity, confidentiality, and data integrity if the first Tor server in their path is malicious. Specifically, if the Tor client chooses a malicious Tor server for her first hop in the circuit, that server can learn all the keys she negotiates for the rest of the circuit (or just spoof the whole circuit), and then read and/or modify all her traffic over that circuit.

References

CVE Name CVE-2005-2643
URL http://archives.seul.org/or/announce/Aug-2005/msg00002.html