Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-8516

Опубликовано: 02 фев. 2020
Источник: debian
EPSS Низкий

Описание

The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability

Пакеты

ПакетСтатусВерсия исправленияРелизТип
torunfixedpackage

Примечания

  • Not considered a bug / explicit design choice by upstream

  • https://lists.torproject.org/pipermail/tor-dev/2020-February/014147.html

  • https://trac.torproject.org/projects/tor/ticket/33129

  • http://www.hackerfactor.com/blog/index.php?/archives/868-Deanonymizing-Tor-Circuits.html

EPSS

Процентиль: 73%
0.0078
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 6 лет назад

The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability

CVSS3: 5.3
nvd
около 6 лет назад

The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability

CVSS3: 5.3
github
больше 3 лет назад

The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information.

EPSS

Процентиль: 73%
0.0078
Низкий