Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2011-12-23T02:00:00Z

Updated: 2024-09-17T01:55:32.706Z

Reserved: 2011-12-22T00:00:00Z

Link: CVE-2011-4895

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2011-12-23T03:59:22.097

Modified: 2011-12-23T05:00:00.000

Link: CVE-2011-4895

cve-icon Redhat

No data.