CVE-2006-3416
概要

Tor before 0.1.1.20 kills the circuit when it receives an unrecognized relay command, which causes network circuits to be disbanded. NOTE: while this item is listed under the "Security fixes" section of the developer changelog, the developer clarified on 20060707 that this is only a self-DoS. Therefore this issue should not be included in CVE

公表日 2006年7月7日9:05
登録日 2021年1月29日15:41
最終更新日 2024年8月8日4:15
CVSS2.0 : MEDIUM
スコア 5.0
ベクター AV:N/AC:L/Au:N/C:N/I:N/A:P
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃前の認証要否(Au) 不要
機密性への影響(C) なし
完全性への影響(I) なし
可用性への影響(A)
全ての特権を取得 いいえ
ユーザー権限を取得 いいえ
その他の権限を取得 いいえ
ユーザー操作が必要 いいえ
影響を受けるソフトウェアの構成
構成1 以上 以下 より上 未満
cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*
cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*
関連情報、対策とツール
共通脆弱性一覧