FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-18 11:12:36 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
0b9f4b5e-5d82-11e7-85df-14dae9d5a9d2tor -- security regression

The Tor Project reports:

Tor 0.3.0.9 fixes a path selection bug that would allow a client to use a guard that was in the same network family as a chosen exit relay. This is a security regression; all clients running earlier versions of 0.3.0.x or 0.3.1.x should upgrade to 0.3.0.9 or 0.3.1.4-alpha.


Discovery 2017-06-29
Entry 2017-06-30
tor
< 0.3.0.9

tor-devel
< 0.3.1.4.a

https://blog.torproject.org/blog/tor-0309-released-security-update-clients
https://blog.torproject.org/blog/tor-0314-alpha-released-security-update-clients
https://lists.torproject.org/pipermail/tor-announce/2017-June/000133.html
CVE-2017-0377
100a9ed2-ee56-11dd-ab4f-0030843d3802tor -- unspecified memory corruption vulnerability

Secunia reports:

A vulnerability with an unknown impact has been reported in Tor.

The vulnerability is caused due to an unspecified error and can be exploited to trigger a heap corruption. No further information is currently available.


Discovery 2009-01-22
Entry 2009-01-29
Modified 2010-05-02
tor
< 0.2.0.33

tor-devel
< 0.2.1.11-alpha

CVE-2009-0414
http://secunia.com/advisories/33635/
http://archives.seul.org/or/announce/Jan-2009/msg00000.html
31c09848-1829-11e4-bf04-60a44c524f57tor -- traffic confirmation attack

The Tor Project reports:

Tor before 0.2.4.23 and 0.2.5 before 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote attackers to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a means of communicating information about hidden service names.


Discovery 2014-07-30
Entry 2014-07-30
tor
< 0.2.4.23

tor-devel
< 0.2.5.6.a

https://lists.torproject.org/pipermail/tor-announce/2014-July/000094.html
https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack
CVE-2014-5117
36ef8753-d86f-11e7-ad28-0025908740c2tor -- Use-after-free in onion service v2

The Torproject.org reports:

  • TROVE-2017-009: Replay-cache ineffective for v2 onion services
  • TROVE-2017-010: Remote DoS attack against directory authorities
  • TROVE-2017-011: An attacker can make Tor ask for a password
  • TROVE-2017-012: Relays can pick themselves in a circuit path
  • TROVE-2017-013: Use-after-free in onion service v2

Discovery 2017-12-01
Entry 2017-12-14
tor
< 0.3.1.9

https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516
CVE-2017-8819
38bdf10e-2293-11e0-bfa4-001676740879tor -- remote code execution and crash

The Tor Project reports:

A remote heap overflow vulnerability that can allow remote code execution. Other fixes address a variety of assert and crash bugs, most of which we think are hard to exploit remotely. All Tor users should upgrade.


Discovery 2011-01-15
Entry 2011-01-17
tor
< 0.2.1.29

tor-devel
< 0.2.2.21.a

45832
CVE-2011-0427
ports/154099
http://archives.seul.org/or/announce/Jan-2011/msg00000.html
https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog
https://gitweb.torproject.org/tor.git/blob/release-0.2.2:/ChangeLog
4bd33bc5-0cd6-11e0-bfa4-001676740879tor -- remote crash and potential remote code execution

The Tor Project reports:

Remotely exploitable bug that could be used to crash instances of Tor remotely by overflowing on the heap. Remote-code execution hasn't been confirmed, but can't be ruled out. Everyone should upgrade.


Discovery 2010-12-17
Entry 2010-12-22
tor
< 0.2.1.28

tor-devel
< 0.2.2.20-alpha

45500
CVE-2010-1676
ports/153326
http://archives.seul.org/or/announce/Dec-2010/msg00000.html
http://archives.seul.org/or/talk/Dec-2010/msg00167.html
https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog
https://gitweb.torproject.org/tor.git/blob/release-0.2.2:/ChangeLog
5d1e4f6a-ee4f-11ec-86c2-485b3931c969Tor - Unspecified high severity vulnerability

Tor organization reports:

TROVE-2022-001


Discovery 2022-06-14
Entry 2022-06-17
tor
< 0.4.7.8

https://gitlab.torproject.org/tpo/core/team/-/wikis/NetworkTeam/TROVE
5fde5c30-0f4e-11da-bc01-000e0c2e438ator -- diffie-hellman handshake flaw

A tor advisory reports

Tor clients can completely loose anonymity, confidentiality, and data integrity if the first Tor server in their path is malicious. Specifically, if the Tor client chooses a malicious Tor server for her first hop in the circuit, that server can learn all the keys she negotiates for the rest of the circuit (or just spoof the whole circuit), and then read and/or modify all her traffic over that circuit.


Discovery 2005-08-11
Entry 2005-08-17
Modified 2005-09-21
tor
< 0.1.0.14

CVE-2005-2643
http://archives.seul.org/or/announce/Aug-2005/msg00002.html
691ed622-e499-11d9-a8bd-000cf18bbe54tor -- information disclosure

Roger Dingledine reports:

The Tor 0.1.0.10 release from a few days ago includes a fix for a bug that might allow an attacker to read arbitrary memory (maybe even keys) from an exit server's process space. We haven't heard any reports of exploits yet, but hey.


Discovery 2005-06-16
Entry 2005-06-24
tor
< 0.1.0.10

http://archives.seul.org/or/announce/Jun-2005/msg00001.html
78f5606b-f9d1-11dd-b79c-0030843d3802tor -- multiple vulnerabilities

Secunia reports:

Some vulnerabilities have been reported in Tor, where one has an unknown impact and others can be exploited by malicious people to cause a DoS.

An error when running Tor as a directory authority can be exploited to trigger the execution of an infinite loop.

An unspecified error exists when running on Windows systems prior to Windows XP. No further information is currently available.


Discovery 2009-02-10
Entry 2009-02-13
Modified 2009-03-20
tor
< 0.2.0.34

tor-devel
< 0.2.12-alpha

CVE-2009-0936
CVE-2009-0937
CVE-2009-0938
http://secunia.com/advisories/33880/
http://archives.seul.org/or/announce/Feb-2009/msg00000.html
847f16e5-9406-11ed-a925-3065ec8fd3ecsecurity/tor -- SOCKS4(a) inversion bug

The Tor Project reports:

TROVE-2022-002: The SafeSocks option for SOCKS4(a) is inverted leading to SOCKS4 going through

This is a report from hackerone:

We have classified this as medium considering that tor was not defending in-depth for dangerous SOCKS request and so any user relying on SafeSocks 1 to make sure they don't link DNS leak and their Tor traffic wasn't safe afterall for SOCKS4(a). Tor Browser doesn't use SafeSocks 1 and SOCKS4 so at least the likely vast majority of users are not affected.


Discovery 2023-01-12
Entry 2023-01-14
tor
< 0.4.7.13

https://hackerone.com/bugs?subject=torproject&report_id=1784589
https://gitlab.torproject.org/tpo/core/tor/-/issues/40730
8e2e6ad8-1720-11d9-9fb9-00902788733btor -- remote DoS and loss of anonymity

Tor has various remote crashes which could lead to a remote denial-of-service and be used to defeat clients anonymity. It is not expected that these vulnerabilities are exploitable for arbitrary code execution.


Discovery 2004-08-25
Entry 2004-10-15
tor
< 0.0.8.1

http://archives.seul.org/or/announce/Aug-2004/msg00001.html
http://archives.seul.org/or/announce/Oct-2004/msg00000.html
c1dc55dc-9556-11e6-b154-3065ec8fd3ecTor -- remote denial of service

The Tor Blog reports:

Prevent a class of security bugs caused by treating the contents of a buffer chunk as if they were a NUL-terminated string. At least one such bug seems to be present in all currently used versions of Tor, and would allow an attacker to remotely crash most Tor instances, especially those compiled with extra compiler hardening. With this defense in place, such bugs can't crash Tor, though we should still fix them as they occur. Closes ticket 20384 (TROVE-2016-10-001).


Discovery 2016-10-17
Entry 2016-10-18
tor
< 0.2.8.9

tor-devel
< 0.2.9.4-alpha

https://blog.torproject.org/blog/tor-0289-released-important-fixes
d38e1810-9ef7-11da-b410-000e0c2e438ator -- malicious tor server can locate a hidden service

Roger Dingledine reports:

If you offer a Tor hidden service, an adversary who can run a fast Tor server and who knows some basic statistics can find the location of your hidden service in a matter of minutes to hours.


Discovery 2006-01-12
Entry 2006-02-16
tor
< 0.1.0.12

CVE-2006-0414
http://archives.seul.org/or/announce/Jan-2006/msg00001.html