diff options
author | remko <remko@FreeBSD.org> | 2005-08-17 19:34:44 +0000 |
---|---|---|
committer | remko <remko@FreeBSD.org> | 2005-08-17 19:34:44 +0000 |
commit | e60c18e63d689a8be50d206bd6dfad5760d46e36 (patch) | |
tree | cf4605ab0d0b2bf0a239e19cebbfb2a3f55e9b8c /security | |
parent | 44308b4031435217b406b8421e722ca76be1d955 (diff) | |
download | FreeBSD-ports-e60c18e63d689a8be50d206bd6dfad5760d46e36.zip FreeBSD-ports-e60c18e63d689a8be50d206bd6dfad5760d46e36.tar.gz |
Document tor -- diffie-hellman handshake flaw.
Submitted by: Michal Bartkowiak <michal at nonspace dot net>
Approved by: portsmgr (blanket VuXML)
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 65fce70..53e7b02 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,37 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="5fde5c30-0f4e-11da-bc01-000e0c2e438a"> + <topic>tor -- diffie-hellman handshake flaw</topic> + <affects> + <package> + <name>tor</name> + <range><gt>0</gt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A tor advisory reports</p> + <blockquote cite="http://archives.seul.org/or/announce/Aug-2005/msg00002.html"> + <p>Tor clients can completely loose anonymity, confidentiality, + and data integrity if the first Tor server in their path is + malicious. Specifically, if the Tor client chooses a + malicious Tor server for her first hop in the circuit, that + server can learn all the keys she negotiates for the rest of + the circuit (or just spoof the whole circuit), and then read + and/or modify all her traffic over that circuit.</p> + </blockquote> + </body> + </description> + <references> + <url>http://archives.seul.org/or/announce/Aug-2005/msg00002.html</url> + </references> + <dates> + <discovery>2005-08-11</discovery> + <entry>2005-08-17</entry> + </dates> + </vuln> + <vuln vid="f74dc01b-0e83-11da-bc08-0001020eed82"> <topic>acroread -- plug-in buffer overflow vulnerability</topic> <affects> |