vendor:
Tor
by:
elgCrew
7.5
CVSS
HIGH
Unauthorized Access
264
CWE
Product Name: Tor
Affected Version From: 0.1.2.15
Affected Version To: 0.1.2.15
Patch Exists: YES
Related CWE: CVE-2008-2360
CPE: a:torproject:tor
Metasploit:
https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2008-2360/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2008-2360/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0503/, https://www.rapid7.com/db/vulnerabilities/apple-osx-x11-cve-2008-2360/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2008-2360/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0502/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0504/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0512/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cesa-2008-0503/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2008
Tor ControlPort torrc Rewrite Vulnerability
An attacker can exploit this issue to reconfigure Tor and significantly weaken the anonymity provided by the software. An attacker can inject malicious code into the Tor ControlPort to rewrite the torrc file, enabling debug logging and an erroneous ExitPolicy. This will allow the attacker to run a malicious program on the next boot.
Mitigation:
Users should upgrade to the latest version of Tor (0.1.2.16) to address this vulnerability.