René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

123 lines
4.1 KiB
JSON

{
"id": "CVE-2018-25022",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-12-13T01:15:07.587",
"lastModified": "2022-02-08T18:55:06.923",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Onion module in toxcore before 0.2.2 doesn't restrict which packets can be onion-routed, which allows a remote attacker to discover a target user's IP address (when knowing only their Tox Id) by positioning themselves close to target's Tox Id in the DHT for the target to establish an onion connection with the attacker, guessing the target's DHT public key and creating a DHT node with public key close to it, and finally onion-routing a NAT Ping Request to the target, requesting it to ping the just created DHT node."
},
{
"lang": "es",
"value": "El m\u00f3dulo Onion en toxcore versiones anteriores a 0.2.2, no restringe los paquetes que pueden ser enrutados en forma onion, lo que permite a un atacante remoto detectar la direcci\u00f3n IP de un usuario objetivo (cuando s\u00f3lo conoce su Tox Id) al posicionarse cerca del Tox Id del objetivo en el DHT para que el objetivo establezca una conexi\u00f3n en forma onion con el atacante, adivinando la clave p\u00fablica del DHT del objetivo y creando un nodo DHT con clave p\u00fablica cerca de \u00e9l, y finalmente enrutando en forma de cebolla una solicitud de ping NAT al objetivo, pidi\u00e9ndole que haga ping al nodo DHT reci\u00e9n creado"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:toktok:toxcore:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.2.2",
"matchCriteriaId": "26501D21-71F8-447C-9E4F-84528A58C30E"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.tox.chat/2018/04/security-vulnerability-and-new-toxcore-release",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://github.com/TokTok/c-toxcore/issues/873",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://github.com/TokTok/c-toxcore/pull/872",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
]
}
]
}