Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.
References
Link | Resource |
---|---|
https://blog.torproject.org/blog/tor-02234-released-security-patches | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2011-12-22 19:59
Updated : 2011-12-22 21:00
NVD link : CVE-2011-4895
Mitre link : CVE-2011-4895
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
tor
- tor