ID

VAR-201001-0283


CVE

CVE-2010-0385


TITLE

Tor Official Directory Query Request Sensitive Information Disclosure Vulnerability

Trust: 1.2

sources: CNNVD: CNNVD-201001-255 // CNVD: CNVD-2010-5331

DESCRIPTION

Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, when functioning as a bridge directory authority, allows remote attackers to obtain sensitive information about bridge identities and bridge descriptors via a dbg-stability.txt directory query. Tor (The Onion Router) is an implementation of the second generation of onion routing, through which users can communicate anonymously over the Internet. Tor is prone to a remote information-disclosure vulnerability. Exploits will allow attackers to obtain sensitive information that can help them launch further attacks. NOTE: Since certain Tor infrastructures were compromised, new version 3 identity keys have been issued. Versions prior to Tor 0.2.1.22 are vulnerable

Trust: 2.43

sources: NVD: CVE-2010-0385 // JVNDB: JVNDB-2010-005252 // CNVD: CNVD-2010-5331 // BID: 37901

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2010-5331

AFFECTED PRODUCTS

vendor:tormodel:torscope:eqversion:0.2.2.7

Trust: 1.6

vendor:tormodel:torscope:eqversion:0.1.2.5

Trust: 1.6

vendor:tormodel:torscope:eqversion:0.2.2.3

Trust: 1.6

vendor:tormodel:torscope:eqversion:0.2.2.4

Trust: 1.6

vendor:tormodel:torscope:eqversion:0.2.2.2

Trust: 1.6

vendor:tormodel:torscope:eqversion:0.1.2.9

Trust: 1.6

vendor:tormodel:torscope:eqversion:0.2.2.1

Trust: 1.6

vendor:tormodel:torscope:eqversion:0.2.2.6

Trust: 1.6

vendor:tormodel:torscope:eqversion:0.1.2.7

Trust: 1.6

vendor:tormodel:torscope:eqversion:0.2.2.5

Trust: 1.6

vendor:tormodel:torscope:eqversion:0.0.9.9

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.5

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.0.12

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.0.13

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.1

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.1.20

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.8

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.10

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.2.16

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.0.14

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.2

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.3

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.4

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.6

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.0.10

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.0.11

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.7

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.1.15

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.5

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre16

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.4

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.12

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.3

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.12

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.19

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.6

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.9_alpha

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre25

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.18

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre14

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.4_alpha

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.17

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.13

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.6

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.14

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.4

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.6.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.10

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre17

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre15

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.8.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.11

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.16

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.1_alpha

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.12

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre19

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.17

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.17

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.19

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.6_alpha

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.7

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.25

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre22

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre13

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.9

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.4

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.21

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.3

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.13

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre21

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.18

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.1_alpha-cvs

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre20

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre24

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.11

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.3_alpha

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.15

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre23

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.7

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.22

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.14

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.6.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.8

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.8_alpha

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.7

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.18

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre18

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.10_alpha

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.7.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.23

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.16

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.13

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.4

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.19

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.21

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.5

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.16

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.8

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.3

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.19

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.30

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.6

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.14

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre26

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.15

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.8

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.7_alpha

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.7.3

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.7.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.5

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.26

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.2_alpha

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre27

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.10

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.9

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.18

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.20

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.5_alpha

Trust: 1.0

vendor:the tormodel:torscope:eqversion:0.2.2.7-alpha

Trust: 0.8

vendor:the tormodel:torscope:ltversion:0.2.2.x

Trust: 0.8

vendor:tormodel:torscope:eqversion:0.2.x

Trust: 0.6

vendor:tormodel:torscope:eqversion:0.2.35

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.2.34

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.2.33

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.2.32

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.2.31

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.1.214

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.1.123

Trust: 0.3

vendor:tormodel:.5-alphascope:eqversion:0.1.1

Trust: 0.3

vendor:tormodel:.4-alphascope:eqversion:0.1.1

Trust: 0.3

vendor:tormodel:.3-alphascope:eqversion:0.1.1

Trust: 0.3

vendor:tormodel:.2-alphascope:eqversion:0.1.1

Trust: 0.3

vendor:tormodel:.1-alphascope:eqversion:0.1.1

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.118

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.2.1.21

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.2.1.20

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.1.2.15

Trust: 0.3

vendor:tormodel:alpha-cvsscope:eqversion:0.1.2.1

Trust: 0.3

vendor:tormodel:torscope:neversion:0.2.1.22

Trust: 0.3

sources: NVD: CVE-2010-0385 // CNNVD: CNNVD-201001-255 // CNVD: CNVD-2010-5331 // JVNDB: JVNDB-2010-005252 // BID: 37901

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2010-0385
value: MEDIUM

Trust: 1.8

CNNVD: CNNVD-201001-255
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2010-5331
value: MEDIUM

Trust: 0.6

NVD: CVE-2010-0385
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.8

CNVD: CNVD-2010-5331
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: NVD: CVE-2010-0385 // CNNVD: CNNVD-201001-255 // CNVD: CNVD-2010-5331 // JVNDB: JVNDB-2010-005252

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.8

sources: NVD: CVE-2010-0385 // JVNDB: JVNDB-2010-005252

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201001-255

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201001-255

CONFIGURATIONS

sources: NVD: CVE-2010-0385

PATCH

title:Top Pageurl:https://www.torproject.org/

Trust: 0.8

sources: JVNDB: JVNDB-2010-005252

EXTERNAL IDS

db:NVDid:CVE-2010-0385

Trust: 3.3

db:BIDid:37901

Trust: 2.5

db:OSVDBid:61865

Trust: 1.6

db:SECUNIAid:38198

Trust: 1.6

db:JVNDBid:JVNDB-2010-005252

Trust: 0.8

db:NSFOCUSid:14397

Trust: 0.6

db:MLISTid:[OR-TALK] 20100120 TOR 0.2.2.7-ALPHA IS OUT

Trust: 0.6

db:MLISTid:[OR-ANNOUNCE] 20100121 TOR 0.2.1.22 IS RELEASED (SECURITY FIX)

Trust: 0.6

db:CNNVDid:CNNVD-201001-255

Trust: 0.6

db:CNVDid:CNVD-2010-5331

Trust: 0.6

sources: NVD: CVE-2010-0385 // CNNVD: CNNVD-201001-255 // CNVD: CNVD-2010-5331 // JVNDB: JVNDB-2010-005252 // BID: 37901

REFERENCES

url:http://www.securityfocus.com/bid/37901

Trust: 2.2

url:http://archives.seul.org/or/talk/jan-2010/msg00162.html

Trust: 1.6

url:http://www.osvdb.org/61865

Trust: 1.6

url:http://archives.seul.org/or/announce/jan-2010/msg00000.html

Trust: 1.6

url:http://secunia.com/advisories/38198

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0385

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0385

Trust: 0.8

url:http://www.nsfocus.net/vulndb/14397

Trust: 0.6

url:http://www.torproject.org/index.html.en

Trust: 0.3

url:http://archives.seul.org/or/talk/jan-2010/msg00161.html

Trust: 0.3

sources: NVD: CVE-2010-0385 // CNNVD: CNNVD-201001-255 // CNVD: CNVD-2010-5331 // JVNDB: JVNDB-2010-005252 // BID: 37901

CREDITS

Roger Dingledine

Trust: 0.6

sources: CNNVD: CNNVD-201001-255

SOURCES

db:NVDid:CVE-2010-0385
db:CNNVDid:CNNVD-201001-255
db:CNVDid:CNVD-2010-5331
db:JVNDBid:JVNDB-2010-005252
db:BIDid:37901

LAST UPDATE DATE

2021-12-17T08:08:14.005000+00:00


SOURCES UPDATE DATE

db:NVDid:CVE-2010-0385date:2010-01-26T05:00:00
db:CNNVDid:CNNVD-201001-255date:2010-01-26T00:00:00
db:CNVDid:CNVD-2010-5331date:2010-01-25T00:00:00
db:JVNDBid:JVNDB-2010-005252date:2012-12-20T00:00:00
db:BIDid:37901date:2015-04-13T21:03:00

SOURCES RELEASE DATE

db:NVDid:CVE-2010-0385date:2010-01-25T19:30:00
db:CNNVDid:CNNVD-201001-255date:2010-01-25T00:00:00
db:CNVDid:CNVD-2010-5331date:2010-01-25T00:00:00
db:JVNDBid:JVNDB-2010-005252date:2012-12-20T00:00:00
db:BIDid:37901date:2010-01-21T00:00:00