Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2014-01-17 21:55
Updated : 2025-04-11 00:51
NVD link : CVE-2013-7295
Mitre link : CVE-2013-7295
CVE.ORG link : CVE-2013-7295
JSON object : View
Products Affected
                torproject
- tor
CWE
                
                    
                        
                        CWE-310
                        
            Cryptographic Issues
