UBUNTU-CVE-2018-25022

Source
https://ubuntu.com/security/CVE-2018-25022
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-25022.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2018-25022
Upstream
Withdrawn
2025-07-18T16:44:52Z
Published
2021-12-13T01:15:00Z
Modified
2025-07-16T07:38:33.347272Z
Severity
  • 3.1 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

The Onion module in toxcore before 0.2.2 doesn't restrict which packets can be onion-routed, which allows a remote attacker to discover a target user's IP address (when knowing only their Tox Id) by positioning themselves close to target's Tox Id in the DHT for the target to establish an onion connection with the attacker, guessing the target's DHT public key and creating a DHT node with public key close to it, and finally onion-routing a NAT Ping Request to the target, requesting it to ping the just created DHT node.

References

Affected packages

Ubuntu:20.04:LTS / libtoxcore

Package

Name
libtoxcore
Purl
pkg:deb/ubuntu/libtoxcore@0.2.10-1build2?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.2.10-1build2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "0.2.10-1build2",
            "binary_name": "libtoxcore-dev"
        },
        {
            "binary_version": "0.2.10-1build2",
            "binary_name": "libtoxcore2"
        },
        {
            "binary_version": "0.2.10-1build2",
            "binary_name": "libtoxcore2-dbgsym"
        },
        {
            "binary_version": "0.2.10-1build2",
            "binary_name": "toxcore-utils"
        },
        {
            "binary_version": "0.2.10-1build2",
            "binary_name": "toxcore-utils-dbgsym"
        }
    ],
    "availability": "No subscription required"
}