The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T10:03:45.879Z

Reserved: 2020-02-02T00:00:00

Link: CVE-2020-8516

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-02-02T13:15:10.903

Modified: 2024-11-21T05:38:58.863

Link: CVE-2020-8516

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses