Tor 0.3.x before 0.3.0.9 has a guard-selection algorithm that only considers the exit relay (not the exit relay's family), which might allow remote attackers to defeat intended anonymity properties by leveraging the existence of large families.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-0731 | Tor 0.3.x before 0.3.0.9 has a guard-selection algorithm that only considers the exit relay (not the exit relay's family), which might allow remote attackers to defeat intended anonymity properties by leveraging the existence of large families. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-05T13:03:56.989Z
Reserved: 2016-11-29T00:00:00
Link: CVE-2017-0377
No data.
Status : Deferred
Published: 2017-07-02T15:29:00.187
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-0377
No data.
OpenCVE Enrichment
No data.
EUVD