Tor does not verify a node's uptime and bandwidth advertisements, which allows remote attackers who operate a low resource node to make false claims of greater resources, which places the node into use for many circuits and compromises the anonymity of traffic sources and destinations.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2007-02-26T17:00:00
Updated: 2024-08-07T12:43:22.579Z
Reserved: 2007-02-26T00:00:00
Link: CVE-2007-1103
Vulnrichment
No data.
NVD
Status : Modified
Published: 2007-02-26T17:28:00.000
Modified: 2024-11-21T00:27:31.537
Link: CVE-2007-1103
Redhat
No data.