Tor 0.3.x before 0.3.0.9 has a guard-selection algorithm that only considers the exit relay (not the exit relay's family), which might allow remote attackers to defeat intended anonymity properties by leveraging the existence of large families.
References
Link | Resource |
---|---|
https://trac.torproject.org/projects/tor/ticket/22753 | Issue Tracking Vendor Advisory |
https://security-tracker.debian.org/CVE-2017-0377 | Third Party Advisory |
https://github.com/torproject/tor/commit/665baf5ed5c6186d973c46cdea165c0548027350 | Patch Third Party Advisory |
https://blog.torproject.org/blog/tor-0314-alpha-released-security-update-clients | Release Notes Vendor Advisory |
https://blog.torproject.org/blog/tor-0309-released-security-update-clients | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-07-02 08:29
Updated : 2017-07-14 07:21
NVD link : CVE-2017-0377
Mitre link : CVE-2017-0377
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
torproject
- tor