Full Disclosure mailing list archives
Tor security advisory: cross-protocol http form attack
From: coderman <coderman () gmail com>
Date: Sat, 1 Sep 2007 13:58:51 -0700
http://archives.seul.org/or/announce/Sep-2007/msg00000.html "... a malicious website or Tor exit node can give the Tor user a page that includes a POST element directed to Tor's control port (localhost:9051)... This particular attack worked because Tor's control protocol gave an error message on unrecognized commands but didn't hang up. So all the http headers from the POST were unrecognized commands, and eventually we got to the payload -- which contains recognized commands -- and it went bad from there... Yay full disclosure " even links on openbsd affected, whee! (upgrade to 0.2.0.6-alpha to help balance the network :) _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Tor security advisory: cross-protocol http form attack coderman (Sep 01)