Описание
The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability
Ссылки
- Mailing ListVendor Advisory
- Mailing ListVendor Advisory
- Third Party Advisory
- Issue TrackingVendor Advisory
- ExploitMitigationTechnical DescriptionThird Party Advisory
- Mailing ListVendor Advisory
- Mailing ListVendor Advisory
- Third Party Advisory
- Issue TrackingVendor Advisory
- ExploitMitigationTechnical DescriptionThird Party Advisory
Уязвимые конфигурации
Одно из
EPSS
5.3 Medium
CVSS3
5 Medium
CVSS2
Дефекты
Связанные уязвимости
The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability
The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not ...
The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information.
EPSS
5.3 Medium
CVSS3
5 Medium
CVSS2