CVE-2017-0377
EUVD-2017-073102.07.2017, 15:29
Tor 0.3.x before 0.3.0.9 has a guard-selection algorithm that only considers the exit relay (not the exit relay's family), which might allow remote attackers to defeat intended anonymity properties by leveraging the existence of large families.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| torproject | tor | 0.3.0.1:alpha |
| torproject | tor | 0.3.0.2:alpha |
| torproject | tor | 0.3.0.3:alpha |
| torproject | tor | 0.3.0.4 |
| torproject | tor | 0.3.0.5 |
| torproject | tor | 0.3.0.6 |
| torproject | tor | 0.3.0.7 |
| torproject | tor | 0.3.0.8 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References