Описание
Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 0.2.2.35-1 |
| hardy | ignored | end of life |
| lucid | DNE | |
| maverick | DNE | |
| natty | ignored | end of life |
| oneiric | ignored | end of life |
| precise | not-affected | 0.2.2.35-1 |
| quantal | not-affected | 0.2.2.35-1 |
| raring | not-affected | 0.2.2.35-1 |
| upstream | not-affected | 0.2.2.35-1 |
Показывать по
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.
Tor before 0.2.2.34, when configured as a bridge, sets up circuits thr ...
Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.
EPSS
4.3 Medium
CVSS2