CVE-2008-5397

N/A Unknown
Published: December 09, 2008 Modified: April 23, 2026
View on NVD

Description

Tor before 0.2.0.32 does not properly process the (1) User and (2) Group configuration options, which might allow local users to gain privileges by leveraging unintended supplementary group memberships of the Tor process.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/33025
Source: cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/bid/32648
Source: cve@mitre.org
Patch
http://blog.torproject.org/blog/tor-0.2.0.32-released
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33025
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/34583
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200904-11.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/32648
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.vupen.com/english/advisories/2008/3366
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/47101
Source: af854a3a-2127-422b-91ae-364da2661108

14 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.0%
14th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

tor