Vulnerability Database

296,172

Total vulnerabilities in the database

CVE-2013-7295

Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors.

  • Published: Jan 17, 2014
  • Updated: Apr 13, 2023
  • CVE: CVE-2013-7295
  • Severity: Low
  • Exploit:

CVSS v2:

  • Severity: Low
  • Score: 4
  • AV:N/AC:H/Au:N/C:P/I:P/A:N

CWEs:

Software From Fixed in
torproject / tor 0.2.4.15-rc 0.2.4.15-rc.x
torproject / tor 0.2.4.6-alpha 0.2.4.6-alpha.x
torproject / tor 0.2.4.1-alpha 0.2.4.1-alpha.x
torproject / tor 0.2.4.2-alpha 0.2.4.2-alpha.x
torproject / tor 0.2.4.12-alpha 0.2.4.12-alpha.x
torproject / tor 0.2.4.9-alpha 0.2.4.9-alpha.x
torproject / tor 0.2.4.4-alpha 0.2.4.4-alpha.x
torproject / tor 0.2.4.14-alpha 0.2.4.14-alpha.x
torproject / tor 0.2.4.8-alpha 0.2.4.8-alpha.x
torproject / tor 0.2.4.17-rc 0.2.4.17-rc.x
torproject / tor 0.2.4.13-alpha 0.2.4.13-alpha.x
torproject / tor 0.2.4.16-rc 0.2.4.16-rc.x
torproject / tor 0.2.4.3-alpha 0.2.4.3-alpha.x
torproject / tor 0.2.4.5-alpha 0.2.4.5-alpha.x
torproject / tor 0.2.4.18-rc 0.2.4.18-rc.x
torproject / tor 0.2.4.11-alpha 0.2.4.11-alpha.x
torproject / tor 0.2.4.10-alpha 0.2.4.10-alpha.x
torproject / tor 0.2.4.7-alpha 0.2.4.7-alpha.x
torproject / tor - 0.2.4.19.x