Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or collected by a rogue site within the Tor network).
Advisories
Source ID Title
EUVD EUVD EUVD-2021-25608 Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or collected by a rogue site within the Tor network).
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T02:06:42.498Z

Reserved: 2021-08-17T00:00:00

Link: CVE-2021-39246

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-09-24T19:15:07.147

Modified: 2024-11-21T06:19:00.780

Link: CVE-2021-39246

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses