製品・ソフトウェアに関する情報
Tor の src/or/relay.c における脆弱性
Title Tor の src/or/relay.c における脆弱性
Summary

Tor の src/or/relay.c の connection_edge_process_relay_cell_not_open 関数には、不特定の影響を受ける脆弱性が存在します。

Possible impacts 終端リレーにより、コントローラが内部 IP アドレスにリダイレクトする DNS レスポンスを承認することで、不特定の影響を受ける可能性があります。
Solution

ベンダ情報および参考情報を参照して適切な対策を実施してください。

Publication Date July 10, 2009, midnight
Registration Date Dec. 20, 2012, 7:10 p.m.
Last Update Dec. 20, 2012, 7:10 p.m.
CVSS2.0 : 警告
Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Affected System
The Tor Project
Tor 0.2.0.35 未満の 0.2.x、および 0.1.2.8-beta 未満の 0.1.x
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2012年12月20日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2009-2426
Summary

The connection_edge_process_relay_cell_not_open function in src/or/relay.c in Tor 0.2.x before 0.2.0.35 and 0.1.x before 0.1.2.8-beta allows exit relays to have an unspecified impact by causing controllers to accept DNS responses that redirect to an internal IP address via unknown vectors. NOTE: some of these details are obtained from third party information.

Publication Date July 11, 2009, 2:30 a.m.
Registration Date Jan. 29, 2021, 1:20 p.m.
Last Update Aug. 17, 2017, 10:30 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List