CVE-2018-25022

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-25022
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-25022.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-25022
Related
Published
2021-12-13T01:15:07Z
Modified
2025-01-14T07:30:08.778731Z
Severity
  • 3.1 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

The Onion module in toxcore before 0.2.2 doesn't restrict which packets can be onion-routed, which allows a remote attacker to discover a target user's IP address (when knowing only their Tox Id) by positioning themselves close to target's Tox Id in the DHT for the target to establish an onion connection with the attacker, guessing the target's DHT public key and creating a DHT node with public key close to it, and finally onion-routing a NAT Ping Request to the target, requesting it to ping the just created DHT node.

References

Affected packages

Debian:11 / libtoxcore

Package

Name
libtoxcore
Purl
pkg:deb/debian/libtoxcore?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.2.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libtoxcore

Package

Name
libtoxcore
Purl
pkg:deb/debian/libtoxcore?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.2.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libtoxcore

Package

Name
libtoxcore
Purl
pkg:deb/debian/libtoxcore?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.2.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/toktok/c-toxcore

Affected ranges

Type
GIT
Repo
https://github.com/toktok/c-toxcore
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.0.1
v0.0.2
v0.0.3
v0.0.4
v0.0.5
v0.1.0
v0.1.1
v0.1.10
v0.1.11
v0.1.2
v0.1.3
v0.1.4
v0.1.5
v0.1.6
v0.1.7
v0.1.8
v0.1.9
v0.2.0
v0.2.1