Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
[Full-disclosure] ScatterChat Advisory 2006-02: Win32 Tor Client Routing and Denial of Service Vulnerabilities
From: ScatterChat Advisories (sc_advisorieshacktivismo.com)
Date: Sat Sep 02 2006 - 20:06:11 CDT
-----BEGIN PGP SIGNED MESSAGE-----
ScatterChat Advisory 2006-02: Win32 Tor Client Routing and Denial of
September 2nd, 2006
CVE ID: CVE-2006-4508
OSVDB: 28276, 28277
ScatterChat (http://www.scatterchat.com/) is an instant messaging project
that aims to provide encryption and anonymity support with Tor to
non-technical users such as human rights activists and political
Vulnerabilities were found in the external Tor program that is packaged
with the Windows installer. This vulnerability allows a Tor entry node
to route traffic through the client, or to cause a denial of service by
crashing the Tor process with malformed input.
The impact of this vulnerability is low.
The official Tor advisory can be found at:
The end-user impact of this issue is low.
Should a malicious or compromised Tor entry node successfully exploit
these issues, the local user's Tor process would crash, and/or the user's
machine would route traffic to other Tor nodes.
Routing unwanted traffic would cause bandwidth resources to be consumed
as long as ScatterChat is running.
All Windows users who employ ScatterChat's anonymity feature are
strongly encouraged to upgrade to ScatterChat v1.0.2:
J. Salvatore Testa II
3428 E58E 715E C37D 2AA7 C55E 97D1 DE8C 4B26 2B62
- - ----
A less technical summary of this advisory can be found at:
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
-----END PGP SIGNATURE-----
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/