![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-23589 – Gentoo Linux Security Advisory 202305-11
https://notcve.org/view.php?id=CVE-2023-23589
14 Jan 2023 — The SafeSocks option in Tor before 0.4.7.13 has a logic error in which the unsafe SOCKS4 protocol can be used but not the safe SOCKS4a protocol, aka TROVE-2022-002. La opción SafeSocks en Tor anterior a 0.4.7.13 tiene un error lógico en el que se puede usar el protocolo SOCKS4 inseguro pero no el protocolo SOCKS4a seguro, también conocido como TROVE-2022-002. A logic error was discovered in the implementation of the "SafeSocks" option of Tor, a connection-based low-latency anonymous communication system, wh... • https://gitlab.torproject.org/tpo/core/tor/-/commit/a282145b3634547ab84ccd959d0537c021ff7ffc •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-33903 – Gentoo Linux Security Advisory 202305-11
https://notcve.org/view.php?id=CVE-2022-33903
20 Jun 2022 — Tor 0.4.7.x before 0.4.7.8 allows a denial of service via the wedging of RTT estimation. Tor versiones 0.4.7.x anteriores a 0.4.7.8, permite una denegación de servicio por medio de la estimación del RTT Multiple vulnerabilities have been found in Tor, the worst of which could result in denial of service. Versions less than 0.4.7.13 are affected. • https://lists.torproject.org/pipermail/tor-announce/2022-June/000242.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-46702
https://notcve.org/view.php?id=CVE-2021-46702
26 Feb 2022 — Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclosure. This could allow local attackers to bypass the intended anonymity feature and obtain information regarding the onion services visited by a local user. This can be accomplished by analyzing RAM memory even several hours after the local user used the product. This occurs because the product doesn't properly free memory. Tor Browser versión 9.0.7 en Windows 10 build 10586, es vulnerable a una divulgación de información. • https://github.com/Exmak-s/CVE-2021-46702 • CWE-404: Improper Resource Shutdown or Release •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-39246
https://notcve.org/view.php?id=CVE-2021-39246
24 Sep 2021 — Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or collected by a rogue site within the Tor network). Tor Browser hasta la versión 10.5.6 y la versión 11.x hasta la 11.0a4 permite un ataque de correlación que puede comprometer la privacidad de las ... • https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-111.md • CWE-532: Insertion of Sensitive Information into Log File •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-38385 – Gentoo Linux Security Advisory 202305-11
https://notcve.org/view.php?id=CVE-2021-38385
17 Aug 2021 — Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship between batch-signature verification and single-signature verification, leading to a remote assertion failure, aka TROVE-2021-007. Tor versiones anteriores a 0.3.5.16, 0.4.5.10, y 0.4.6.7, maneja inapropiadamente la relación entre la verificación de firma por lotes y la verificación de firma única, conllevando a un fallo de aserción remota, también se conoce como TROVE-2021-007. Henry de Valence reported a flaw in the signature verificat... • https://blog.torproject.org • CWE-617: Reachable Assertion •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-34549 – Gentoo Linux Security Advisory 202107-25
https://notcve.org/view.php?id=CVE-2021-34549
28 Jun 2021 — An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency. Se ha detectado un problema en Tor versiones anteriores a 0.4.6.5, también se conoce como TROVE-2021-005. Un hashing es manejado inapropiadamente para determinadas recuperaciones de datos del circuito. • https://blog.torproject.org/node/2041 • CWE-400: Uncontrolled Resource Consumption •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-34548 – Tor Half-Closed Connection Stream Confusion
https://notcve.org/view.php?id=CVE-2021-34548
14 Jun 2021 — An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream. Se ha detectado un problema en Tor versiones anteriores a 0.4.6.5, también se conoce como TROVE-2021-003. Un atacante puede falsificar las funciones RELAY_END o RELAY_RESOLVED para omitir el control de acceso previsto para terminar un flujo Tor suffers from an issue where half-closed connection tracking ignores layer_hint and due to t... • https://packetstorm.news/files/id/163510 • CWE-290: Authentication Bypass by Spoofing •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-34550 – Gentoo Linux Security Advisory 202107-25
https://notcve.org/view.php?id=CVE-2021-34550
14 Jun 2021 — An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006. The v3 onion service descriptor parsing allows out-of-bounds memory access, and a client crash, via a crafted onion service descriptor Se ha detectado un problema en Tor versiones anteriores a 0.4.6.5, también se conoce como TROVE-2021-006. El análisis del descriptor del servicio de v3 onion, permite un acceso a la memoria fuera de límites, y un bloqueo del cliente, por medio de un descriptor de servicio onion diseñado Multiple security vuln... • https://blog.torproject.org/node/2041 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-28090 – Debian Security Advisory 4871-1
https://notcve.org/view.php?id=CVE-2021-28090
19 Mar 2021 — Tor before 0.4.5.7 allows a remote attacker to cause Tor directory authorities to exit with an assertion failure, aka TROVE-2021-002. Tor versiones anteriores a 0.4.5.7, permite a un atacante remoto causar que autoridades del directorio de Tor salgan con un fallo de aserción, también se conoce como TROVE-2021-002 Two vulnerabilities were discovered in Tor, a connection-based low-latency anonymous communication system, which could lead to excessive CPU usage or cause a directory authority to crash. • https://blog.torproject.org/node/2009 • CWE-617: Reachable Assertion •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-28089 – Debian Security Advisory 4871-1
https://notcve.org/view.php?id=CVE-2021-28089
19 Mar 2021 — Tor before 0.4.5.7 allows a remote participant in the Tor directory protocol to exhaust CPU resources on a target, aka TROVE-2021-001. Tor versiones anteriores a 0.4.5.7, permite a un participante remoto en el protocolo de directorio de Tor agotar los recursos de la CPU en un objetivo, también se conoce como TROVE-2021-001 Two vulnerabilities were discovered in Tor, a connection-based low-latency anonymous communication system, which could lead to excessive CPU usage or cause a directory authority to crash. • https://blog.torproject.org/node/2009 • CWE-400: Uncontrolled Resource Consumption •