The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2020-02-02T12:52:56

Updated: 2024-08-04T10:03:45.879Z

Reserved: 2020-02-02T00:00:00

Link: CVE-2020-8516

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-02-02T13:15:10.903

Modified: 2024-08-04T10:15:36.970

Link: CVE-2020-8516

cve-icon Redhat

No data.