The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2020-02-02T12:52:56
Updated: 2024-08-04T10:03:45.879Z
Reserved: 2020-02-02T00:00:00
Link: CVE-2020-8516
Vulnrichment
No data.
NVD
Status : Modified
Published: 2020-02-02T13:15:10.903
Modified: 2024-11-21T05:38:58.863
Link: CVE-2020-8516
Redhat
No data.