CVE-2006-3419
Published: 7 July 2006
Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks.
Priority
Status
Package | Release | Status |
---|---|---|
tor Launchpad, Ubuntu, Debian |
dapper |
Ignored
(end of life)
|
edgy |
Released
(0.1.1.20-1)
|
|
feisty |
Released
(0.1.1.20-1)
|
|
gutsy |
Released
(0.1.1.20-1)
|
|
hardy |
Released
(0.1.1.20-1)
|
|
intrepid |
Released
(0.1.1.20-1)
|
|
jaunty |
Does not exist
|
|
karmic |
Does not exist
|
|
upstream |
Released
(0.1.1.20)
|