// For flags

CVE-2021-34548

Tor Half-Closed Connection Stream Confusion

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream.

Se ha detectado un problema en Tor versiones anteriores a 0.4.6.5, tambiƩn se conoce como TROVE-2021-003. Un atacante puede falsificar las funciones RELAY_END o RELAY_RESOLVED para omitir el control de acceso previsto para terminar un flujo

Tor suffers from an issue where half-closed connection tracking ignores layer_hint and due to this, entry/middle relays can spoof RELAY_END cells on half-closed streams, which can lead to stream confusion between OP and exit.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-06-10 CVE Reserved
  • 2021-06-14 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-09-15 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-290: Authentication Bypass by Spoofing
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Torproject
Search vendor "Torproject"
Tor
Search vendor "Torproject" for product "Tor"
< 0.3.5.15
Search vendor "Torproject" for product "Tor" and version " < 0.3.5.15"
-
Affected
Torproject
Search vendor "Torproject"
Tor
Search vendor "Torproject" for product "Tor"
>= 0.4.0.0 < 0.4.4.9
Search vendor "Torproject" for product "Tor" and version " >= 0.4.0.0 < 0.4.4.9"
-
Affected
Torproject
Search vendor "Torproject"
Tor
Search vendor "Torproject" for product "Tor"
>= 0.4.5.0 < 0.4.5.9
Search vendor "Torproject" for product "Tor" and version " >= 0.4.5.0 < 0.4.5.9"
-
Affected
Torproject
Search vendor "Torproject"
Tor
Search vendor "Torproject" for product "Tor"
>= 0.4.6.0 < 0.4.6.5
Search vendor "Torproject" for product "Tor" and version " >= 0.4.6.0 < 0.4.6.5"
-
Affected