CVE-2005-2643

Publication date 23 August 2005

Last updated 24 July 2024


Ubuntu priority

Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit.

Status

No maintained releases are affected by this CVE.

Package Ubuntu Release Status
tor 7.04 feisty
Not affected
6.10 edgy
Not affected
6.06 LTS dapper
Not affected