VYPR
Unrated severityNVD Advisory· Published Jan 17, 2014· Updated Apr 29, 2026

CVE-2013-7295

CVE-2013-7295

Description

Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors.

Affected products

19
  • Torproject/Tor19 versions
    cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*+ 18 more
    • cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*range: <=0.2.4.19
    • cpe:2.3:a:torproject:tor:0.2.4.10:alpha:*:*:*:*:*:*
    • cpe:2.3:a:torproject:tor:0.2.4.11:alpha:*:*:*:*:*:*
    • cpe:2.3:a:torproject:tor:0.2.4.12:alpha:*:*:*:*:*:*
    • cpe:2.3:a:torproject:tor:0.2.4.13:alpha:*:*:*:*:*:*
    • cpe:2.3:a:torproject:tor:0.2.4.14:alpha:*:*:*:*:*:*
    • cpe:2.3:a:torproject:tor:0.2.4.15:rc:*:*:*:*:*:*
    • cpe:2.3:a:torproject:tor:0.2.4.16:rc:*:*:*:*:*:*
    • cpe:2.3:a:torproject:tor:0.2.4.17:rc:*:*:*:*:*:*
    • cpe:2.3:a:torproject:tor:0.2.4.18:rc:*:*:*:*:*:*
    • cpe:2.3:a:torproject:tor:0.2.4.1:alpha:*:*:*:*:*:*
    • cpe:2.3:a:torproject:tor:0.2.4.2:alpha:*:*:*:*:*:*
    • cpe:2.3:a:torproject:tor:0.2.4.3:alpha:*:*:*:*:*:*
    • cpe:2.3:a:torproject:tor:0.2.4.4:alpha:*:*:*:*:*:*
    • cpe:2.3:a:torproject:tor:0.2.4.5:alpha:*:*:*:*:*:*
    • cpe:2.3:a:torproject:tor:0.2.4.6:alpha:*:*:*:*:*:*
    • cpe:2.3:a:torproject:tor:0.2.4.7:alpha:*:*:*:*:*:*
    • cpe:2.3:a:torproject:tor:0.2.4.8:alpha:*:*:*:*:*:*
    • cpe:2.3:a:torproject:tor:0.2.4.9:alpha:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.