CVE-2017-0377

Tor 0.3.x before 0.3.0.9 has a guard-selection algorithm that only considers the exit relay (not the exit relay's family), which might allow remote attackers to defeat intended anonymity properties by leveraging the existence of large families.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:torproject:tor:0.3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.3.0.3:alpha:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.3.0.2:alpha:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.3.0.1:alpha:*:*:*:*:*:*
cpe:2.3:a:torproject:tor:0.3.0.7:*:*:*:*:*:*:*

Information

Published : 2017-07-02 08:29

Updated : 2017-07-14 07:21


NVD link : CVE-2017-0377

Mitre link : CVE-2017-0377


JSON object : View

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

Advertisement

dedicated server usa

Products Affected

torproject

  • tor