Public bug reported:

Well I already filled out a bugreport about that tor is way to outdated
more than 2 months ago and you didn't care. Maybe a security-vuln will
change this. Source: http://secunia.com/advisories/26301

Description:
A vulnerability has been reported in Tor, which can be exploited by malicious 
people to bypass certain security restrictions.

The vulnerability is caused due to the ControlPort (localhost:9051)
handling commands without authentication when the first command was not
a successful "authenticate" command. This can be exploited to e.g.
modify the "torrc" file, when a user views a malicious web page
containing a specially crafted POST request or via a malicious tor exit
node.

Successful exploitation may compromise a user's anonymity, but requires
that the ControlPort is enabled.

The vulnerability is reported in versions prior to 0.1.2.16.


Addition: The control port is activated by default. An exploit also if its just 
for the windows version has already been released: 
http://milw0rm.com/exploits/4468 , so its likly also linux-exploits are out in 
the wild.

** Affects: feisty-backports
     Importance: Undecided
         Status: New

** Affects: tor (Ubuntu)
     Importance: Undecided
         Status: New

** Visibility changed to: Public

** Also affects: tor (Ubuntu)
   Importance: Undecided
       Status: New

-- 
Tor is vulnerable to a rewrite vuln on the controlport
https://bugs.launchpad.net/bugs/152232
You received this bug notification because you are a member of Ubuntu
Backporters, which is a direct subscriber.

-- 
ubuntu-backports mailing list
ubuntu-backports@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-backports

Reply via email to