Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2007-4174

Overview

Vulnerability Score 5.8 5.8
CVE Id CVE-2007-4174
Last Modified 17 Mar 2011 12:00:00
Published 07 Aug 2007 06:17:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2007-4174

Summary

Tor before 0.1.2.16, when ControlPort is enabled, does not properly restrict commands to localhost port 9051, which allows remote attackers to modify the torrc configuration file, compromise anonymity, and have other unspecified impact via HTTP POST data containing commands without valid authentication, as demonstrated by an HTML form (1) hosted on a web site or (2) injected by a Tor exit node.

Vulnerable Systems

Application

  • Tor 0.1.2.1

  • Tor 0.1.2.10

  • Tor 0.1.2.11

  • Tor 0.1.2.12

  • Tor 0.1.2.13

  • Tor 0.1.2.14

  • Tor 0.1.2.15

  • Tor 0.1.2.2

  • Tor 0.1.2.3

  • Tor 0.1.2.4

  • Tor 0.1.2.5

  • Tor 0.1.2.6

  • Tor 0.1.2.7

  • Tor 0.1.2.8

  • Tor 0.1.2.9


References

XF - tor-control-command-execution(36407)

XF - tor-controlport-security-bypass(35784)

VUPEN - ADV-2007-2768

SECTRACK - 1018510

BID - 25188

SECUNIA - 26301

OSVDB - 36271

MLIST - [or-announce] 20070901 Tor security advisory: cross-protocol http form attack

MLIST - [or-announce] 20070802 Tor 0.1.2.16 is released


Last Updated: 27 May 2016 10:45:47