CVE-2021-39246

Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or collected by a rogue site within the Tor network).
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:torproject:tor_browser:*:*:*:*:*:*:*:*
cpe:2.3:a:torproject:tor_browser:11.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:torproject:tor_browser:11.0:alpha4:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Information

Published : 2021-09-24 12:15

Updated : 2021-10-01 06:00


NVD link : CVE-2021-39246

Mitre link : CVE-2021-39246


JSON object : View

CWE
CWE-532

Insertion of Sensitive Information into Log File

Advertisement

dedicated server usa

Products Affected

torproject

  • tor_browser

microsoft

  • windows

apple

  • macos

linux

  • linux_kernel