CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
73.4%
Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks.
Vendor | Product | Version | CPE |
---|---|---|---|
tor | tor | 0.0.2 | cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre13 | cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre14 | cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre15 | cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre16 | cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre17 | cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre18 | cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre19 | cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre20 | cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:* |
tor | tor | 0.0.2_pre21 | cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:* |