ID

VAR-201001-0712


CVE

CVE-2010-0383


TITLE

Tor official directory query request information disclosure vulnerability

Trust: 1.2

sources: CNVD: CNVD-2010-5332 // CNNVD: CNNVD-201001-253

DESCRIPTION

Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations. Tor (The Onion Router) is an implementation of the second generation of onion routing software, through which users can communicate anonymously over the Internet. If the user submits a specially made query request to the bridge official directory, the directory authority will reveal all the tracked bridge identities in the response of dbg-stability.txt, which is an information disclosure. Tor is prone to a remote information-disclosure vulnerability. Exploits will allow attackers to obtain sensitive information that can help them launch further attacks. NOTE: Since certain Tor infrastructures were compromised, new version 3 identity keys have been issued. Versions prior to Tor 0.2.1.22 are vulnerable. ---------------------------------------------------------------------- Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/ ---------------------------------------------------------------------- TITLE: Tor Directory Authorities Directory Queries Information Disclosure SECUNIA ADVISORY ID: SA38198 VERIFY ADVISORY: http://secunia.com/advisories/38198/ DESCRIPTION: A security issue has been reported in Tor, which can be exploited by malicious people to disclose potentially sensitive information. SOLUTION: Update to version 0.2.1.22. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://permalink.gmane.org/gmane.network.onion-routing.announce/30 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.52

sources: NVD: CVE-2010-0383 // JVNDB: JVNDB-2010-005250 // CNVD: CNVD-2010-5332 // BID: 37901 // PACKETSTORM: 85478

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2010-5332

AFFECTED PRODUCTS

vendor:tormodel:torscope:eqversion:0.2.2.1

Trust: 1.6

vendor:tormodel:torscope:eqversion:0.1.2.5

Trust: 1.6

vendor:tormodel:torscope:eqversion:0.2.2.4

Trust: 1.6

vendor:tormodel:torscope:eqversion:0.2.2.5

Trust: 1.6

vendor:tormodel:torscope:eqversion:0.1.2.9

Trust: 1.6

vendor:tormodel:torscope:eqversion:0.2.2.6

Trust: 1.6

vendor:tormodel:torscope:eqversion:0.2.2.3

Trust: 1.6

vendor:tormodel:torscope:eqversion:0.2.2.2

Trust: 1.6

vendor:tormodel:torscope:eqversion:0.1.2.7

Trust: 1.6

vendor:tormodel:torscope:eqversion:0.2.2.7

Trust: 1.6

vendor:tormodel:torscope:eqversion:0.1.1.20

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.0.14

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.0.13

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.0.12

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.0.11

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.0.10

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.9

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.8

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.7

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.6

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.5

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.4

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.3

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.2

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.10

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9.1

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.0.9

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.2.16

Trust: 1.3

vendor:tormodel:torscope:eqversion:0.1.1.7

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.1_alpha

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.25

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.21

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.3

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.19

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.8

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.16

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.15

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.7

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.14

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.6

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.8.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.5

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.4

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.10

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.21

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.14

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre21

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.18

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.18

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.1_alpha-cvs

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre14

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.7

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.19

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.16

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.10_alpha

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.13

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.16

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.13

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre18

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.3

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.12

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.2_alpha

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.17

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.18

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.19

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.4

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre22

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.5_alpha

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.23

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.22

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.26

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.4

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.17

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.4_alpha

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.8

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.18

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.12

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.6.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.8_alpha

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.5

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre16

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.9_alpha

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.11

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre17

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.7.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.30

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.8

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.7_alpha

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.4

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre27

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.20

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.13

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.17

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.6_alpha

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.9

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre24

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.7.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre25

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre13

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre19

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.5

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.15

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.12

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre15

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre23

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.9

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre26

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.6

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.11

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.15

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.2_pre20

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.0.1

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.10

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.6.2

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.2.14

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.6

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.3_alpha

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.0.7.3

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.1.1.3

Trust: 1.0

vendor:tormodel:torscope:eqversion:0.2.1.1.19

Trust: 1.0

vendor:the tormodel:torscope:eqversion:0.2.2.7-alpha

Trust: 0.8

vendor:the tormodel:torscope:ltversion:0.2.2.x

Trust: 0.8

vendor:tormodel:torscope:eqversion:0.2.x

Trust: 0.6

vendor:tormodel:torscope:eqversion:0.2.35

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.2.34

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.2.33

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.2.32

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.2.31

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.1.214

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.1.123

Trust: 0.3

vendor:tormodel:.5-alphascope:eqversion:0.1.1

Trust: 0.3

vendor:tormodel:.4-alphascope:eqversion:0.1.1

Trust: 0.3

vendor:tormodel:.3-alphascope:eqversion:0.1.1

Trust: 0.3

vendor:tormodel:.2-alphascope:eqversion:0.1.1

Trust: 0.3

vendor:tormodel:.1-alphascope:eqversion:0.1.1

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.118

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.2.1.21

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.2.1.20

Trust: 0.3

vendor:tormodel:torscope:eqversion:0.1.2.15

Trust: 0.3

vendor:tormodel:alpha-cvsscope:eqversion:0.1.2.1

Trust: 0.3

vendor:tormodel:torscope:neversion:0.2.1.22

Trust: 0.3

sources: CNVD: CNVD-2010-5332 // BID: 37901 // JVNDB: JVNDB-2010-005250 // CNNVD: CNNVD-201001-253 // NVD: CVE-2010-0383

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-0383
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-0383
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2010-5332
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201001-253
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2010-0383
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2010-5332
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2010-5332 // JVNDB: JVNDB-2010-005250 // CNNVD: CNNVD-201001-253 // NVD: CVE-2010-0383

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.8

sources: JVNDB: JVNDB-2010-005250 // NVD: CVE-2010-0383

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201001-253

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201001-253

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-005250

PATCH

title:Top Pageurl:https://www.torproject.org/

Trust: 0.8

sources: JVNDB: JVNDB-2010-005250

EXTERNAL IDS

db:NVDid:CVE-2010-0383

Trust: 3.3

db:BIDid:37901

Trust: 2.5

db:SECUNIAid:38198

Trust: 1.7

db:OSVDBid:61977

Trust: 1.6

db:JVNDBid:JVNDB-2010-005250

Trust: 0.8

db:CNVDid:CNVD-2010-5332

Trust: 0.6

db:MLISTid:[OR-TALK] 20100120 TOR 0.2.2.7-ALPHA IS OUT

Trust: 0.6

db:MLISTid:[OR-TALK] 20100120 RE: TOR PROJECT INFRASTRUCTURE UPDATES IN RESPONSE TO SECURITY BREACH

Trust: 0.6

db:MLISTid:[OR-ANNOUNCE] 20100121 TOR 0.2.1.22 IS RELEASED (SECURITY FIX)

Trust: 0.6

db:MLISTid:[OR-TALK] 20100120 TOR PROJECT INFRASTRUCTURE UPDATES IN RESPONSE TO SECURITY BREACH

Trust: 0.6

db:NSFOCUSid:14397

Trust: 0.6

db:CNNVDid:CNNVD-201001-253

Trust: 0.6

db:PACKETSTORMid:85478

Trust: 0.1

sources: CNVD: CNVD-2010-5332 // BID: 37901 // JVNDB: JVNDB-2010-005250 // PACKETSTORM: 85478 // CNNVD: CNNVD-201001-253 // NVD: CVE-2010-0383

REFERENCES

url:http://www.securityfocus.com/bid/37901

Trust: 2.2

url:http://archives.seul.org/or/talk/jan-2010/msg00161.html

Trust: 1.9

url:http://secunia.com/advisories/38198

Trust: 1.6

url:http://osvdb.org/61977

Trust: 1.6

url:http://archives.seul.org/or/talk/jan-2010/msg00165.html

Trust: 1.6

url:http://archives.seul.org/or/talk/jan-2010/msg00162.html

Trust: 1.6

url:http://archives.seul.org/or/announce/jan-2010/msg00000.html

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0383

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0383

Trust: 0.8

url:http://www.nsfocus.net/vulndb/14397

Trust: 0.6

url:http://www.torproject.org/index.html.en

Trust: 0.3

url:http://permalink.gmane.org/gmane.network.onion-routing.announce/30

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/blog/71/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/38198/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2010-5332 // BID: 37901 // JVNDB: JVNDB-2010-005250 // PACKETSTORM: 85478 // CNNVD: CNNVD-201001-253 // NVD: CVE-2010-0383

CREDITS

Roger Dingledine

Trust: 0.6

sources: CNNVD: CNNVD-201001-253

SOURCES

db:CNVDid:CNVD-2010-5332
db:BIDid:37901
db:JVNDBid:JVNDB-2010-005250
db:PACKETSTORMid:85478
db:CNNVDid:CNNVD-201001-253
db:NVDid:CVE-2010-0383

LAST UPDATE DATE

2025-04-11T22:59:43.286000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2010-5332date:2010-01-25T00:00:00
db:BIDid:37901date:2015-04-13T21:03:00
db:JVNDBid:JVNDB-2010-005250date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-201001-253date:2010-01-26T00:00:00
db:NVDid:CVE-2010-0383date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2010-5332date:2010-01-25T00:00:00
db:BIDid:37901date:2010-01-21T00:00:00
db:JVNDBid:JVNDB-2010-005250date:2012-12-20T00:00:00
db:PACKETSTORMid:85478date:2010-01-21T10:22:16
db:CNNVDid:CNNVD-201001-253date:2010-01-25T00:00:00
db:NVDid:CVE-2010-0383date:2010-01-25T19:30:01.637