CVE-2009-0654

Publication date 20 February 2009

Last updated 24 July 2024


Ubuntu priority

Tor 0.2.0.28, and probably 0.2.0.34 and earlier, allows remote attackers, with control of an entry router and an exit router, to confirm that a sender and receiver are communicating via vectors involving (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, and then observing cell recognition errors at the exit router. NOTE: the vendor disputes the significance of this issue, noting that the product’s design “accepted end-to-end correlation as an attack that is too expensive to solve.”

Status

No maintained releases are affected by this CVE.

Package Ubuntu Release Status
tor 11.10 oneiric
Not affected
11.04 natty
Not affected
10.10 maverick Not in release
10.04 LTS lucid Not in release
9.10 karmic Not in release
9.04 jaunty Not in release
8.10 intrepid Ignored end of life, was needed
8.04 LTS hardy Ignored end of life
7.10 gutsy Ignored end of life, was needed
6.06 LTS dapper Ignored end of life