CVE-2017-8819
HIGH
7,5
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high
MEDIUM
5,0
Source: [email protected]
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: none
Integrity: none
Availability: partial
Description
AI Translation Available
In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, the replay-cache protection mechanism is ineffective for v2 onion services, aka TROVE-2017-009. An attacker can send many INTRODUCE2 cells to trigger this issue.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0055
Percentile
0,7th
Updated
EPSS Score Trend (Last 90 Days)
Application
Tor by Tor Project
Version Range Affected
To
0.2.5.16
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:tor_project:tor:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Tor by Tor Project
Version Range Affected
From
0.3.1
(inclusive)
To
0.3.1.9
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:tor_project:tor:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Tor by Tor Project
Version Range Affected
From
0.2.6
(inclusive)
To
0.2.8.17
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:tor_project:tor:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Debian Linux by Debian
CPE Identifier
View Detailed Analysis
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Debian Linux by Debian
CPE Identifier
View Detailed Analysis
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Tor by Tor Project
Version Range Affected
From
0.2.9
(inclusive)
To
0.2.9.14
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:tor_project:tor:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Tor by Tor Project
Version Range Affected
From
0.3.0
(inclusive)
To
0.3.0.13
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:tor_project:tor:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-0…
https://bugs.torproject.org/24244
https://www.debian.org/security/2017/dsa-4054
https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-0…
https://bugs.torproject.org/24244
https://www.debian.org/security/2017/dsa-4054