CVE-2009-0654
Publication date 20 February 2009
Last updated 24 July 2024
Ubuntu priority
Tor 0.2.0.28, and probably 0.2.0.34 and earlier, allows remote attackers, with control of an entry router and an exit router, to confirm that a sender and receiver are communicating via vectors involving (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, and then observing cell recognition errors at the exit router. NOTE: the vendor disputes the significance of this issue, noting that the product’s design “accepted end-to-end correlation as an attack that is too expensive to solve.”
Status
Package | Ubuntu Release | Status |
---|---|---|
tor | 11.10 oneiric |
Not affected
|
11.04 natty |
Not affected
|
|
10.10 maverick | Not in release | |
10.04 LTS lucid | Not in release | |
9.10 karmic | Not in release | |
9.04 jaunty | Not in release | |
8.10 intrepid | Ignored end of life, was needed | |
8.04 LTS hardy | Ignored end of life | |
7.10 gutsy | Ignored end of life, was needed | |
6.06 LTS dapper | Ignored end of life |