Cryptographic issues in Tor - CVE-2013-7295

 

Cryptographic issues in Tor - CVE-2013-7295

Published: January 17, 2014 / Updated: August 10, 2020


Vulnerability identifier: #VU42144
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2013-7295
CWE-ID: CWE-310
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: tor.eff.org
Affected software:
Tor

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors.


How to mitigate CVE-2013-7295

Install update from vendor's website.

Sources