Tor before 0.1.1.20 does not sufficiently obey certain firewall options, which allows remote attackers to bypass intended access restrictions for dirservers, direct connections, or proxy servers.
                
            References
                    | Link | Resource | 
|---|---|
| http://secunia.com/advisories/20514 | Patch Vendor Advisory | 
| http://security.gentoo.org/glsa/glsa-200606-04.xml | Patch Vendor Advisory | 
| http://tor.eff.org/cvs/tor/ChangeLog | |
| http://www.osvdb.org/25874 | |
| http://secunia.com/advisories/20514 | Patch Vendor Advisory | 
| http://security.gentoo.org/glsa/glsa-200606-04.xml | Patch Vendor Advisory | 
| http://tor.eff.org/cvs/tor/ChangeLog | |
| http://www.osvdb.org/25874 | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 00:13
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://secunia.com/advisories/20514 - Patch, Vendor Advisory | |
| References | () http://security.gentoo.org/glsa/glsa-200606-04.xml - Patch, Vendor Advisory | |
| References | () http://tor.eff.org/cvs/tor/ChangeLog - | |
| References | () http://www.osvdb.org/25874 - | 
Information
                Published : 2006-07-07 00:05
Updated : 2025-04-03 01:03
NVD link : CVE-2006-3412
Mitre link : CVE-2006-3412
CVE.ORG link : CVE-2006-3412
JSON object : View
Products Affected
                tor
- tor
CWE
                