Tor does not verify a node's uptime and bandwidth advertisements, which allows remote attackers who operate a low resource node to make false claims of greater resources, which places the node into use for many circuits and compromises the anonymity of traffic sources and destinations.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2007-02-26T17:00:00

Updated: 2024-08-07T12:43:22.579Z

Reserved: 2007-02-26T00:00:00

Link: CVE-2007-1103

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2007-02-26T17:28:00.000

Modified: 2008-11-15T06:43:18.127

Link: CVE-2007-1103

cve-icon Redhat

No data.