Vulnerabilites related to scatterchat - scatterchat
CVE-2006-4508 (GCVE-0-2006-4508)
Vulnerability from cvelistv5
Published
2006-08-31 23:00
Modified
2024-08-07 19:14
Severity ?
CWE
  • n/a
Summary
Unspecified vulnerability in (1) Tor 0.1.0.x before 0.1.0.18 and 0.1.1.x before 0.1.1.23, and (2) ScatterChat before 1.0.2, allows remote attackers operating a Tor entry node to route arbitrary Tor traffic through clients or cause a denial of service (flood) via unspecified vectors.
References
http://secunia.com/advisories/21725 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/19785 vdb-entry, x_refsource_BID
http://www.scatterchat.com/advisories/2006-02_tech.html x_refsource_CONFIRM
http://archives.seul.org/or/announce/Aug-2006/msg00001.html mailing-list, x_refsource_MLIST
https://exchange.xforce.ibmcloud.com/vulnerabilities/28686 vdb-entry, x_refsource_XF
http://secunia.com/advisories/21708 third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:14:47.330Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "21725",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21725"
          },
          {
            "name": "19785",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19785"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.scatterchat.com/advisories/2006-02_tech.html"
          },
          {
            "name": "[or-announce] 20060829 Tor security advisory: clients will route traffic",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://archives.seul.org/or/announce/Aug-2006/msg00001.html"
          },
          {
            "name": "tor-trafficrouting-dos(28686)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28686"
          },
          {
            "name": "21708",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21708"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-08-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in (1) Tor 0.1.0.x before 0.1.0.18 and 0.1.1.x before 0.1.1.23, and (2) ScatterChat before 1.0.2, allows remote attackers operating a Tor entry node to route arbitrary Tor traffic through clients or cause a denial of service (flood) via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "21725",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21725"
        },
        {
          "name": "19785",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19785"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.scatterchat.com/advisories/2006-02_tech.html"
        },
        {
          "name": "[or-announce] 20060829 Tor security advisory: clients will route traffic",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://archives.seul.org/or/announce/Aug-2006/msg00001.html"
        },
        {
          "name": "tor-trafficrouting-dos(28686)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28686"
        },
        {
          "name": "21708",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21708"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4508",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in (1) Tor 0.1.0.x before 0.1.0.18 and 0.1.1.x before 0.1.1.23, and (2) ScatterChat before 1.0.2, allows remote attackers operating a Tor entry node to route arbitrary Tor traffic through clients or cause a denial of service (flood) via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "21725",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21725"
            },
            {
              "name": "19785",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19785"
            },
            {
              "name": "http://www.scatterchat.com/advisories/2006-02_tech.html",
              "refsource": "CONFIRM",
              "url": "http://www.scatterchat.com/advisories/2006-02_tech.html"
            },
            {
              "name": "[or-announce] 20060829 Tor security advisory: clients will route traffic",
              "refsource": "MLIST",
              "url": "http://archives.seul.org/or/announce/Aug-2006/msg00001.html"
            },
            {
              "name": "tor-trafficrouting-dos(28686)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28686"
            },
            {
              "name": "21708",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21708"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4508",
    "datePublished": "2006-08-31T23:00:00",
    "dateReserved": "2006-08-31T00:00:00",
    "dateUpdated": "2024-08-07T19:14:47.330Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-4021 (GCVE-0-2006-4021)
Vulnerability from cvelistv5
Published
2006-08-17 21:00
Modified
2024-08-07 18:57
Severity ?
CWE
  • n/a
Summary
The cryptographic module in ScatterChat 1.0.x allows attackers to identify patterns in large numbers of messages by identifying collisions using a birthday attack on the custom padding mechanism for ECB mode encryption.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:57:43.870Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "19485",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19485"
          },
          {
            "name": "20060811 ScatterChat Advisory 2006-01: Cryptanalytic Attack Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/443038/100/100/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.scatterchat.com/advisories/2006-01_tech.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.scatterchat.com/advisories/2006-01_non_tech.html"
          },
          {
            "name": "1396",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/1396"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-08-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The cryptographic module in ScatterChat 1.0.x allows attackers to identify patterns in large numbers of messages by identifying collisions using a birthday attack on the custom padding mechanism for ECB mode encryption."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "19485",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19485"
        },
        {
          "name": "20060811 ScatterChat Advisory 2006-01: Cryptanalytic Attack Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/443038/100/100/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.scatterchat.com/advisories/2006-01_tech.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.scatterchat.com/advisories/2006-01_non_tech.html"
        },
        {
          "name": "1396",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/1396"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4021",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The cryptographic module in ScatterChat 1.0.x allows attackers to identify patterns in large numbers of messages by identifying collisions using a birthday attack on the custom padding mechanism for ECB mode encryption."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "19485",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19485"
            },
            {
              "name": "20060811 ScatterChat Advisory 2006-01: Cryptanalytic Attack Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/443038/100/100/threaded"
            },
            {
              "name": "http://www.scatterchat.com/advisories/2006-01_tech.html",
              "refsource": "CONFIRM",
              "url": "http://www.scatterchat.com/advisories/2006-01_tech.html"
            },
            {
              "name": "http://www.scatterchat.com/advisories/2006-01_non_tech.html",
              "refsource": "CONFIRM",
              "url": "http://www.scatterchat.com/advisories/2006-01_non_tech.html"
            },
            {
              "name": "1396",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/1396"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4021",
    "datePublished": "2006-08-17T21:00:00",
    "dateReserved": "2006-08-08T00:00:00",
    "dateUpdated": "2024-08-07T18:57:43.870Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2006-08-31 23:04
Modified
2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in (1) Tor 0.1.0.x before 0.1.0.18 and 0.1.1.x before 0.1.1.23, and (2) ScatterChat before 1.0.2, allows remote attackers operating a Tor entry node to route arbitrary Tor traffic through clients or cause a denial of service (flood) via unspecified vectors.
Impacted products
Vendor Product Version
scatterchat scatterchat *
tor tor 0.1.0.1
tor tor 0.1.0.2
tor tor 0.1.0.3
tor tor 0.1.0.4
tor tor 0.1.0.5
tor tor 0.1.0.6
tor tor 0.1.0.7
tor tor 0.1.0.8
tor tor 0.1.0.9
tor tor 0.1.0.10
tor tor 0.1.0.11
tor tor 0.1.0.12
tor tor 0.1.0.13
tor tor 0.1.0.14
tor tor 0.1.0.15
tor tor 0.1.0.16
tor tor 0.1.0.17
tor tor 0.1.1.1
tor tor 0.1.1.2
tor tor 0.1.1.3
tor tor 0.1.1.4
tor tor 0.1.1.5
tor tor 0.1.1.6
tor tor 0.1.1.7
tor tor 0.1.1.8
tor tor 0.1.1.9
tor tor 0.1.1.10
tor tor 0.1.1.11
tor tor 0.1.1.12
tor tor 0.1.1.13
tor tor 0.1.1.14
tor tor 0.1.1.15
tor tor 0.1.1.16
tor tor 0.1.1.17
tor tor 0.1.1.18
tor tor 0.1.1.19
tor tor 0.1.1.20
tor tor 0.1.1.21
tor tor 0.1.1.22



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:scatterchat:scatterchat:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A31047A-47A2-4D8D-B5C3-ABBB213FB0EE",
              "versionEndIncluding": "1.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in (1) Tor 0.1.0.x before 0.1.0.18 and 0.1.1.x before 0.1.1.23, and (2) ScatterChat before 1.0.2, allows remote attackers operating a Tor entry node to route arbitrary Tor traffic through clients or cause a denial of service (flood) via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en (1) Tor 0.1.0.x anteriores a 0.1.0.18 y 0.1.1.x anteriores a 0.1.1.23, y (2) ScatterChat anterior a 1.0.2, permite a atacantes remotos operando un \"nodo de entrada\" en la red Tor encaminar tr\u00e1fico Tor de su elecci\u00f3n a trav\u00e9s de clientes o causar una denegaci\u00f3n de acceso (inundaci\u00f3n) mediante vectores no especificados.\r\n\r\n"
    }
  ],
  "evaluatorSolution": "This vulenrability is addressed in the following product release:\r\nTor, Tor, 0.1.1.23, and later\r\nScatterchat, Scatterchat, 1.0.2",
  "id": "CVE-2006-4508",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-08-31T23:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://archives.seul.org/or/announce/Aug-2006/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21708"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21725"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory",
        "URL Repurposed"
      ],
      "url": "http://www.scatterchat.com/advisories/2006-02_tech.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/19785"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28686"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://archives.seul.org/or/announce/Aug-2006/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21708"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21725"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory",
        "URL Repurposed"
      ],
      "url": "http://www.scatterchat.com/advisories/2006-02_tech.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/19785"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28686"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-08-17 21:04
Modified
2025-04-03 01:03
Severity ?
Summary
The cryptographic module in ScatterChat 1.0.x allows attackers to identify patterns in large numbers of messages by identifying collisions using a birthday attack on the custom padding mechanism for ECB mode encryption.
Impacted products
Vendor Product Version
scatterchat scatterchat 1.0.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:scatterchat:scatterchat:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "798E948D-3CF2-48DD-B490-13EC82F20D1C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The cryptographic module in ScatterChat 1.0.x allows attackers to identify patterns in large numbers of messages by identifying collisions using a birthday attack on the custom padding mechanism for ECB mode encryption."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo criptogr\u00e1fico en ScatterChat 1.0.x permite a atacantes identificar patrones en gran n\u00famero de mensajes mediante la identificaci\u00f3n de colisiones utilizando un \"ataque de cumplea\u00f1os\" (birthday attack) en el mecanismo de relleno espec\u00edfico para el modo ECB de cifrado."
    }
  ],
  "evaluatorSolution": "This vulnerability will be addressed in the following future product release:\r\nScatterChat, ScatterChat, 2.0",
  "id": "CVE-2006-4021",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-08-17T21:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/1396"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory",
        "URL Repurposed"
      ],
      "url": "http://www.scatterchat.com/advisories/2006-01_non_tech.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory",
        "URL Repurposed"
      ],
      "url": "http://www.scatterchat.com/advisories/2006-01_tech.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/443038/100/100/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/19485"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/1396"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory",
        "URL Repurposed"
      ],
      "url": "http://www.scatterchat.com/advisories/2006-01_non_tech.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory",
        "URL Repurposed"
      ],
      "url": "http://www.scatterchat.com/advisories/2006-01_tech.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/443038/100/100/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/19485"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}