CVE-2021-38385

7.5 HIGH

📋 TL;DR

This vulnerability in Tor's signature verification implementation causes a remote assertion failure when processing specially crafted signatures. It affects all Tor clients and relays running vulnerable versions, potentially causing denial of service.

💻 Affected Systems

Products:
  • Tor
Versions: Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7
Operating Systems: All platforms running Tor
Default Config Vulnerable: ⚠️ Yes
Notes: All default Tor configurations are vulnerable. Both clients and relays are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attackers can crash Tor processes, causing denial of service for users and disrupting Tor network operations.

🟠

Likely Case

Targeted attacks against Tor relays or clients causing service disruption and potential deanonymization if combined with other attacks.

🟢

If Mitigated

Minimal impact if patched; unpatched systems remain vulnerable to DoS attacks.

🌐 Internet-Facing: HIGH - Tor relays and clients are internet-facing by design and vulnerable to remote exploitation.
🏢 Internal Only: LOW - Tor is primarily used for external network communication, not internal-only services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted signatures to trigger assertion failure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Tor 0.3.5.16, 0.4.5.10, and 0.4.6.7

Vendor Advisory: https://blog.torproject.org/node/2062

Restart Required: Yes

Instructions:

1. Stop Tor service. 2. Update Tor using package manager (apt/yum/brew) or compile from source. 3. Restart Tor service.

🔧 Temporary Workarounds

Disable Tor service

linux

Temporarily disable Tor to prevent exploitation

sudo systemctl stop tor
sudo service tor stop

🧯 If You Can't Patch

  • Implement network filtering to block malicious traffic targeting Tor ports
  • Monitor Tor process health and implement automatic restart on crash

🔍 How to Verify

Check if Vulnerable:

Check Tor version with 'tor --version' and compare against affected versions

Check Version:

tor --version

Verify Fix Applied:

Verify version is 0.3.5.16, 0.4.5.10, or 0.4.6.7 or later

📡 Detection & Monitoring

Log Indicators:

  • Tor process crashes
  • Assertion failure messages in logs
  • Unexpected Tor restarts

Network Indicators:

  • Unusual traffic patterns to Tor ports (default 9050, 9051, 9150)

SIEM Query:

process_name:tor AND (event_type:crash OR log_message:"assertion failure")

🔗 References

📤 Share & Export