Your submission was sent successfully! Close

CVE-2005-2643

Published: 23 August 2005

Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit.

Priority

Unknown

Status

Package Release Status
tor
Launchpad, Ubuntu, Debian
Upstream Needs triage