Public bug reported: Well I already filled out a bugreport about that tor is way to outdated more than 2 months ago and you didn't care. Maybe a security-vuln will change this. Source: http://secunia.com/advisories/26301
Description: A vulnerability has been reported in Tor, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to the ControlPort (localhost:9051) handling commands without authentication when the first command was not a successful "authenticate" command. This can be exploited to e.g. modify the "torrc" file, when a user views a malicious web page containing a specially crafted POST request or via a malicious tor exit node. Successful exploitation may compromise a user's anonymity, but requires that the ControlPort is enabled. The vulnerability is reported in versions prior to 0.1.2.16. Addition: The control port is activated by default. An exploit also if its just for the windows version has already been released: http://milw0rm.com/exploits/4468 , so its likly also linux-exploits are out in the wild. ** Affects: feisty-backports Importance: Undecided Status: New ** Affects: tor (Ubuntu) Importance: Undecided Status: New ** Visibility changed to: Public ** Also affects: tor (Ubuntu) Importance: Undecided Status: New -- Tor is vulnerable to a rewrite vuln on the controlport https://bugs.launchpad.net/bugs/152232 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs