CVE-2014-5117

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
30/07/2014
Last modified:
12/04/2025

Description

Tor before 0.2.4.23 and 0.2.5 before 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote attackers to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a means of communicating information about hidden service names.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:torproject:tor:*:alpha:*:*:*:*:*:* 0.2.4.22 (including)
cpe:2.3:a:torproject:tor:0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.0.2:pre13:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.0.2:pre14:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.0.2:pre15:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.0.2:pre16:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.0.2:pre17:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.0.2:pre18:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.0.2:pre19:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.0.2:pre20:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.0.2:pre21:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.0.2:pre22:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.0.2:pre23:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.0.2:pre24:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.0.2:pre25:*:*:*:*:*:*